{"id":1288,"date":"2020-11-04T09:05:00","date_gmt":"2020-11-04T09:05:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1288"},"modified":"2020-12-28T12:49:11","modified_gmt":"2020-12-28T12:49:11","slug":"how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/","title":{"rendered":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.fireeye.com\/content\/dam\/fireeye-www\/offers\/pdfs\/pf\/email\/ig-it-only-takes-one-email.pdf\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">FireEye<\/a> reports that one in every 101 emails is malicious! But how do you know if an email is fake or legit? Let\u2019s find out from these 7 tips!<\/h2>\n\n\n\n<p>Ever wonder how to tell if an email is fake? When we talk about fake emails, we&#8217;re referring to hoax emails that are sent to defraud you or trick you into doing something you shouldn&#8217;t. Such emails are also known as phishing emails. <\/p>\n\n\n\n<p>Phishing emails are used to execute various cybercrimes. We all receive many emails every day \u2014 many of which wind up in our spam folders. But many times, phishing emails easily escape from the email client&#8217;s scrutiny and get delivered in our inboxes.<\/p>\n\n\n\n<p>So, if you\u2019re wondering how to spot a fake email \u2014 or, more specifically, how to tell if an email is fake or real \u2014 we\u2019ve got you covered.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7 Tips for How to Tell If an Email Is Fake<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1.&nbsp;Inspect the Email Header Info to Verify Whether the Sender&#8217;s Address is Legitimate<\/h3>\n\n\n\n<p>The first sign of a phishing email is that attackers pose as legitimate companies or people. By posing as a legitimate person or business, the cybercriminal&#8217;s target is more likely to believe the email is legit and will engage with it.<\/p>\n\n\n\n<p>Legitimate organizations typically send emails from email addresses containing the company\u2019s domain name after the \u201c@\u201d symbol. For example, <em>xyz<\/em><strong>@wellsfargo.com<\/strong>, <em>xyz<\/em><strong>@amazon.com<\/strong>, xyz<strong>@apple.com<\/strong>, etc. In other words, the company\u2019s domain should be what comes after the \u201c@\u201d sign. To get such an email address, you must own the domain name, or an authorized person from the company needs to create one for you.<\/p>\n\n\n\n<p>If you get an email claiming to be from a well-known organization, here&#8217;s how you can easily tell if the email is fake: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The sender&#8217;s email is coming from public domain email addresses such as Gmail, Hotmail, Yahoo, AOL, etc.<\/li><li>The email is sent from an unknown domain name.<\/li><li>The sender&#8217;s name and the name in the email address don&#8217;t match.<\/li><\/ul>\n\n\n\n<p>For example, if the sender claims that email is from Chase bank, the sender&#8217;s email address must have @chase.com or @jpmorgen.com in it. If the sender&#8217;s email address ends with \u201c@gmail.com\u201d or some unusual domain name after @, it\u2019s a big red flag.<\/p>\n\n\n\n<p>Check out the example below:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"311\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1-1024x311.png\" alt=\"A screenshot of a phishing email for the article how to tell if an email is fake\" class=\"wp-image-1290 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1-1024x311.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1-300x91.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1-560x170.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1-940x285.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-example1.png 1207w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>As you can see in the screenshot above, if the email were from Hilton, it would have \u201c@hilton.com\u201d in the sender\u2019s email address instead of \u201c@gmail.com\u201d or some unknown domain like \u201c@naver.com.\u201d<\/p>\n\n\n\n<p>Check out another example below. Here, a spammer impersonates my employer, John Tuncer. But it\u2019s easy to recognize such a fake email because of the non-company related email address:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"882\" height=\"414\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-ceo.png\" alt=\"A screenshot of a fake email from a CEO\" class=\"wp-image-1291 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-ceo.png 882w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-ceo-300x141.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-ceo-560x263.png 560w\" sizes=\"auto, (max-width: 882px) 100vw, 882px\" \/><figcaption>Cybercriminals hope that a target will see the sender&#8217;s name and will forget to check the sender&#8217;s email address.<\/figcaption><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Look for Deceptive Domains and Spellings in Email Addresses<\/h4>\n\n\n\n<p>Some attackers are smart enough to not use a generic email address. They buy domain names that look similar to the legitimate company\u2019s domain that they wish to impersonate. They commonly add extra words or replace some of the letters\/words in the original domain name. Check out the below table to get a clearer idea of how scammers use deceptive domains:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Trick<\/strong><\/td><td><strong>Example<\/strong><\/td><td><strong>Example<\/strong><\/td><\/tr><tr><td><\/td><td><strong>Original domain<\/strong><\/td><td><strong>Duplicate domain<\/strong><\/td><\/tr><tr><td><strong>Replace &#8220;S&#8221; with &#8220;5<\/strong>&#8220;<\/td><td>chase.com<\/td><td>cha5e.com<\/td><\/tr><tr><td><strong>Replace &#8220;m&#8221; with &#8220;rn<\/strong>&#8220;<\/td><td>macys.com<\/td><td>rnacys.com<\/td><\/tr><tr><td><strong>Replace &#8220;L&#8221; with &#8220;1&#8221;<\/strong><\/td><td>wallmart.com<\/td><td>wal1mart.com<\/td><\/tr><tr><td><strong>Replace &#8220;O&#8221; with &#8220;0&#8221;<\/strong><\/td><td>wellsfargo.com<\/td><td>wellsfarg0.com<\/td><\/tr><tr><td><strong>Add extra words<\/strong><\/td><td>apple.com ebay.com<\/td><td>apple-online.com ebaysupport.com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Now, even if email recipients are vigilant, they might fail to see the difference between support@wellsfargo.com and support@wellsfarg0.com! A perfect example of this occurred recently when <a href=\"https:\/\/pagesix.com\/2020\/02\/28\/shark-tank-star-barbara-corcoran-gets-back-almost-400k-after-scam\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">an employee of \u201cShark Tank\u201d star and entrepreneur Barbara Corcoran fell for a phishing email<\/a>. The attacker sent an email to Corcoran\u2019s bookkeeper while impersonating her assistant and instructed the bookkeeper to pay to a vendor that Corcoran allegedly invested in.<\/p>\n\n\n\n<p>Thus, it\u2019s vital that you always review the sender&#8217;s email address with extra caution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Watch Out For Uncommon Uses of the Email Bcc Field<\/h3>\n\n\n\n<p>In some emails, you will find your email address listed in the Bcc field instead of the recipient lines. Although there\u2019s technically nothing wrong with keeping the recipient in the Bcc field, it unusual for organizations to do when communicating with customers. For example, no legit company would send a blind carbon copy email to verify your account information or to request customers to download the transaction receipts. Why? Because they would reach out to you directly.<\/p>\n\n\n\n<p>So, if you see your email address in the Bcc field instead of in front of &#8220;<strong>To:<\/strong>\u201d or \u201c<strong>Send To:<\/strong>&#8221; it\u2019s a good sign that the email is a fake.<\/p>\n\n\n\n<p>Let\u2019s consider the example phishing email in the screenshot below. Check out how the sender lists my email address in the Bcc column instead of the recipient (<strong>To:<\/strong>) field. Also, see how smart the sender is by including \u201c@amazon.com\u201d as part of the sender\u2019s display email address to deceive the recipient.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"422\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1-1024x422.png\" alt=\"An example of an Amazon phishing email\" class=\"wp-image-1293 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1-1024x422.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1-300x124.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1-560x231.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1-940x388.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-email-example-amazon-1.png 1207w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Check Whether Embedded Links Redirect to Unexpected Websites<\/h3>\n\n\n\n<p>Another characteristic of a fake email is unexpected redirect links. The embedded links given in the email must take you to the same web page as written in the link. However, scammers include text that looks like it will take you to a legitimate website, but the hyperlinks they embed take you to a phishing or malicious website instead.<\/p>\n\n\n\n<p>For example, you get an email that looks like coming from PayPal. It\u2019s warning you about an unauthorized login attempt and asking you to change the password to protect your account. There is a link given to change your password: <strong><em>https:\/\/www.paypal.com\/account\/passwordChange<\/em><\/strong>. You think it\u2019s safe to click as the link looks legit. But when you click on this link, you\u2019ll be redirected to some spammy website that looks legitimate because they use PayPal\u2019s site design, colors, fonts, and logo. Here, the fake website will try to trick you into sharing your login credentials or other confidential details.<\/p>\n\n\n\n<p>Some links might lead users to a malware-laden website that auto-downloads malware onto users\u2019 devices without their knowledge. According to <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Verizon\u2019s 2020 Data Breach Investigations Report (DBIR)<\/a>, most malware is sent via email.<\/p>\n\n\n\n<p>Sometimes, malicious redirects are hidden in the \u201cUnsubscribe\u201d tab as well.<\/p>\n\n\n\n<p>But how can you tell whether a link is legitimate without actually clicking on the link? There are two ways you can check for fake links in suspicious emails:<\/p>\n\n\n\n<p>1. <strong>Hover your cursor over the link to display the real URL.<\/strong> As you can see in the screenshot below, hovering over the link will show you where the link is redirecting to. If the pop-up URL differs from the information that displays in the linked text, it\u2019s likely a malicious link. Don\u2019t click on it!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url-1024x256.png\" alt=\"A screenshot of how an embedded URL displays while hovering over a link in an email\" class=\"wp-image-1294 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url-1024x256.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url-300x75.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url-560x140.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url-940x235.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-embedded-url.png 1150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>2. <strong>Right-click on the link (or button) in question and select on &#8220;Inspect&#8221; in the drop-down menu<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>On the right-hand side (or at the bottom), you\u2019ll see a new window pop up with a bunch of code.<\/li><li>Here, you\u2019ll see a URL after <strong>&lt;a href= <\/strong>text.It is where the given text\/media links to. In other words, it shows that if you click on the link, it will take you to that specific URL.&nbsp;<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-1024x256.png\" alt=\"A screenshot of the link inspection tool\" class=\"wp-image-1295 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-1024x256.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-300x75.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-560x140.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-1536x385.png 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-940x235.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button-1600x400.png 1600w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-check-link-in-button.png 1613w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>In the above example, I have right-clicked on the word <strong>authentication<\/strong> and clicked on the <strong>Inspect<\/strong>. On the right side, you can see the URL of the page that is linked to the word <strong>authentication<\/strong>. (NOTE: Not all email clients will allow you to inspect elements this way.)<\/p>\n\n\n\n<p>By following this technique, you can always inspect the suspicious links, media, and buttons.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">A Bonus URL Inspection Tip<\/h4>\n\n\n\n<p>If one of the links you see uses a URL shortened (links that start with tinyurl, bit.ly, goo.gl, is.gd, t.co, etc.), you can see the expanded URL by using this website: getlinkinfo.com<\/p>\n\n\n\n<p>Historically, people would shorten URLs to make links look more professional and less space consuming. But nowadays, spammers are also using the URL-shorting tools to hide their original malicious links.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Pay Attention: Don\u2019t Ignore Unusual Spelling and Grammatical Errors<\/h3>\n\n\n\n<p>If an email contains many grammatical, spelling, or punctuation errors, it\u2019s a red flag. Legit companies follow <strong>strict email etiquette and editorial standards<\/strong>. Although some small typos can happen on occasion, it\u2019s uncommon to see multiple mistakes in a single message. Never ignore such errors.<\/p>\n\n\n\n<p>See the example below that highlights several examples of how to tell if an email is fake. Although you can spot that the email is fake from the sender\u2019s unusual email address, there are other red flags, too. Check out the spelling and punctuation errors (marked with red underlines). A reputable company like Apple doesn\u2019t send an email with so many glaring errors.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"677\" height=\"807\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-spot-fake-email-apple.png\" alt=\"A screenshot of a fake email from Apple\" class=\"wp-image-1296 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-spot-fake-email-apple.png 677w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-spot-fake-email-apple-252x300.png 252w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-spot-fake-email-apple-560x668.png 560w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">5.&nbsp;Ask Yourself Whether the Language Seems Fishy, Pushy, or Urgent<\/h3>\n\n\n\n<p>Scammers will try to trigger emotional responses like anger, shock, empathy, panic, curiosity, etc. By doing so, they\u2019re more likely to trick their targets into doing something they normally wouldn\u2019t do.&nbsp;<\/p>\n\n\n\n<p>For example, they might send you emails on the following subjects:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>An unbelievable deal\/discount on the product<\/li><li>A high-priced lottery winning<\/li><li>Offering a job<\/li><li>Unauthorized access of your account<\/li><li>Data-breach incident of your credentials<\/li><li>Free credit reports<\/li><li>A (fake) purchase from your account (see Amazon\u2019s the screenshot in the previous point)<\/li><li>A fundraising campaign for poor\/people suffering from rare diseases\/victims of natural calamities<\/li><\/ul>\n\n\n\n<p>There are many subjects that elicit emotional responses from email recipients. Hackers know this and will use email subjects that will spur targets to take action without stopping to inspect or investigate the emails properly.<\/p>\n\n\n\n<p>Check out the screenshot below as an example of how to tell if an email is fake:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"583\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-stripe-email.png\" alt=\"Example of how to spot a fake email from Stripe (from idtheftcenter.org)\" class=\"wp-image-1297 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-stripe-email.png 799w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-stripe-email-300x219.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/fake-stripe-email-560x409.png 560w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><figcaption>Image Source: <a href=\"https:\/\/www.idtheftcenter.org\/stripe-email-phishing-scam-making-the-rounds\/\" target=\"_blank\" rel=\"noreferrer noopener\">idtheftcenter.org<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>As you can see, this example email mentions a temporary hold on the Stripe account due to some unexplained bank-related issues. Now, it\u2019s likely that people using Stripe on a regular basis (businesses, freelancers, advertisers, remote employees, etc.) would get anxious after reading such an email and try to respond immediately.<\/p>\n\n\n\n<p><strong>Hackers like to create a sense of urgency.<\/strong> Sometimes, scammers impose time limits to force users to take prompt action in panic. Check out the following email example. Along with the account suspension threat, there\u2019s also a deadline mentioned. Often times, attackers will impose deadlines of 24 or 48 hours. Such deadlines pressure users to take the prompt actions suggested in the email.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"689\" height=\"529\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/example-of-a-fake-email-rackspace.png\" alt=\"An example of a fake (phishing) email from Rackspace\" class=\"wp-image-1298 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/example-of-a-fake-email-rackspace.png 689w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/example-of-a-fake-email-rackspace-300x230.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/example-of-a-fake-email-rackspace-560x430.png 560w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><figcaption>Image source: The SSL Store<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">6. Ask Yourself if Email Attachments Are Unsolicited or Unexpected<\/h3>\n\n\n\n<p>A good rule of thumb when it comes to email attachments is to ask yourself: Did I request this information? Frequently, cybercriminals will send emails with phony attachments to get you to inadvertently download their malicious executables. These attachments could come in many forms, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Invoice documents<\/li><li>Receipts for payment<\/li><li>Photos or other graphics<\/li><li>Pricing sheets<\/li><li>Spreadsheets<\/li><\/ul>\n\n\n\n<p>Check out the following examples of phishing emails one of my colleagues received. These unsolicited emails contain Word docs and other attachments:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"375\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/BTC-phishing-example.png\" alt=\"A screenshot of a BTC wallet phishing email\" class=\"wp-image-1299 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/BTC-phishing-example.png 866w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/BTC-phishing-example-300x130.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/BTC-phishing-example-560x242.png 560w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><figcaption>This is a screenshot of an unsolicited email that one of my colleagues received.<\/figcaption><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"713\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email-1024x713.png\" alt=\"A screenshot of a fake email with a receipt attachment\" class=\"wp-image-1300 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email-1024x713.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email-300x209.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email-560x390.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email-940x655.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/really-bad-phishing-email.png 1207w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>A screenshot of a second email that one of my colleagues received.<\/figcaption><\/figure><\/div>\n\n\n\n<p>In this example, Outlook was able to easily identify the attachment as a suspicious or unsafe file. However, that\u2019s not always the case and many times malicious attachments pass through email filters.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/security-news-trends\/security-trends\/the-rise-of-document-based-malware.aspx\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Document-based malware<\/a> like this has become relatively common. This is because Microsoft and Adobe added the ability for Word docs and PDFs to work like executables via scripting and macros. Sophos shares some additional concerns:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cSome document-based malware types have the ability to spread to other documents on an infected system. Once there, any legitimate document a user sends to friends and colleagues could end up spreading the malware.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>When in doubt about whether an email or its attachment is fake or legitimate, reach out to the sender directly. Preferably, call them via phone using a number that\u2019s listed on an official source such as a company contact directory. Never use the contact information that\u2019s listed in a questionable email!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Be Vigilant (Even If the Email is From a Legit Email Address)<\/h3>\n\n\n\n<p>The above tips will help you to know if an email is fake when the attacks use a fake email address. But what if you get an unusual or unsolicited email from a friend or relative from their <strong>authentic email address?<\/strong><\/p>\n\n\n\n<p>There are different types of malware and cyber-attacks that can corrupt a users&#8217; devices and send phishing emails on their behalf to other victims. These <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">types of malware<\/a> can delete the emails from the sent folder, and the victims remain unaware of such compromise. There\u2019s no exact way to define an &#8220;unusual email,&#8221; but just use your instincts. Something about the email may look or feel \u201coff\u201d \u2014 for example, the email may ask you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Immediately transfer money to help them.<\/li><li>Open a website to get the benefit of an unbelievable (unrealistic) deal\/discount.<\/li><li>Donate money to some unknown organization.<\/li><li>Reply with your phone number, some files or personal information.<\/li><li>Download a software, attachment, or a media file.<\/li><\/ul>\n\n\n\n<p>If you get such an email, this is another time when you should reach out to the sender personally (even if the email is from a legit email address) via phone before taking actions suggested in the email. Your loved one\u2019s email account might be compromised, and they have no clue about it!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Cybercriminals Send Fake (Phishing) Emails<\/h3>\n\n\n\n<p>Scammers are becoming smarter and more innovative with their email phishing techniques that <a href=\"https:\/\/www.scmagazineuk.com\/even-security-experts-fail-spot-phishing-emails-finds-report\/article\/1478723\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">even the most vigilant people become victims of email phishing scams<\/a>.<\/p>\n\n\n\n<p>Phishing emails are sent to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Create a sense of urgency to get victims to engage with them.<\/li><li>Deliver malware to the victim\u2019s computer via attachments or links.<\/li><li>Redirect victims to a malicious website or a website that looks the replica of a <a href=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-a-website-is-legit-in-10-easy-steps\/\">legit company&#8217;s website<\/a>.<\/li><li>Trick recipients into sharing their login credentials, financial, or other sensitive information.<\/li><\/ul>\n\n\n\n<p>Needless to say, it\u2019s high time that you and your employees learn how to spot a fake email in order to protect yourself and your organization from <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">email phishing scams<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping Up: What To Do If an Email Is Fake<\/h2>\n\n\n\n<p>The aforementioned seven tips will definitely help you spot a fake email. But, what to do after you receive such an email? Ignoring such fake emails won\u2019t be enough. You should also delete phishing emails as soon as you get them. But before deleting them, you should:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Block the sender:<\/strong> Click on the <strong>More<\/strong> (three vertical dots) option on the email. It is located in different places in all the email clients. For example, Google Chrome&#8217;s <strong>More<\/strong> tab is located on the upper right side of the email. In Yahoo, it is located at the bottom of the email. So, search for the three vertical dots and click on the \u201c<strong>Report as spam<\/strong>\u201d and \u201c<strong>Block this user<\/strong>.&#8221;<\/li><\/ul>\n\n\n\n<p>If you don\u2019t want to open the email, you can right-click on it in your inbox. In the drop-down menu in Gmail, for example, go to <strong>Move To<\/strong> and click on <strong>Spam.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"584\" height=\"463\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-move-email-to-spam.png\" alt=\"A screenshot of the spam tool in Gmail\" class=\"wp-image-1301 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-move-email-to-spam.png 584w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-move-email-to-spam-300x238.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-move-email-to-spam-560x444.png 560w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/figure><\/div>\n\n\n\n<p><strong>Report the Fake Email: <\/strong>If you receive a phishing email from someone impersonating a company, forward the email to that company&#8217;s official customer support email address to let them know.<\/p>\n\n\n\n<p>If you have become a victim of cybercrime due to a phishing email, register the complaint with the following groups:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.ic3.gov\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">FBI Internet Crime Complaint Center (IC<sup>3<\/sup>)<\/a><\/li><li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.ftccomplaintassistant.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Federal Trade Commission<\/a><\/li><li>The Anti-Phishing Working Group (APWG): <a href=\"mailto:reportphishing@apwg.org\">reportphishing@apwg.org<\/a>&nbsp;<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>FireEye reports that one in every 101 emails is malicious! But how do you know if an email is fake or legit? Let\u2019s find out from these 7 tips! Ever&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1304,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[103,30],"class_list":["post-1288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-security","tag-how-to-tell-if-an-email-is-fake","tag-phishing","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email<\/title>\n<meta name=\"description\" content=\"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email\" \/>\n<meta property=\"og:description\" content=\"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-04T09:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-28T12:49:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email\",\"datePublished\":\"2020-11-04T09:05:00+00:00\",\"dateModified\":\"2020-12-28T12:49:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/\"},\"wordCount\":2656,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/how-to-tell-if-an-email-is-fake-feature.jpg\",\"keywords\":[\"how to tell if an email is fake\",\"phishing\"],\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/\",\"name\":\"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/how-to-tell-if-an-email-is-fake-feature.jpg\",\"datePublished\":\"2020-11-04T09:05:00+00:00\",\"dateModified\":\"2020-12-28T12:49:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/how-to-tell-if-an-email-is-fake-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/how-to-tell-if-an-email-is-fake-feature.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"mail on screen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email","description":"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/","og_locale":"en_US","og_type":"article","og_title":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email","og_description":"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.","og_url":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/","og_site_name":"InfoSec Insights","article_published_time":"2020-11-04T09:05:00+00:00","article_modified_time":"2020-12-28T12:49:11+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email","datePublished":"2020-11-04T09:05:00+00:00","dateModified":"2020-12-28T12:49:11+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/"},"wordCount":2656,"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg","keywords":["how to tell if an email is fake","phishing"],"articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/","url":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/","name":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg","datePublished":"2020-11-04T09:05:00+00:00","dateModified":"2020-12-28T12:49:11+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"Wondering how to tell if an email is fake? Spotting a fake email is easier than you may think so long as you follow these 7 specific tips.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/08\/how-to-tell-if-an-email-is-fake-feature.jpg","width":1600,"height":1000,"caption":"mail on screen."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/how-to-tell-if-an-email-is-fake-tips-to-spot-a-fake-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Tell If an Email Is Fake: 7 Tips to Spot a Fake Email"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1288"}],"version-history":[{"count":8,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1288\/revisions"}],"predecessor-version":[{"id":2043,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1288\/revisions\/2043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1304"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}