From the course: How to Conduct a Phishing Email Investigation

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Solution: Putting it all together

Solution: Putting it all together

(upbeat music) - [Instructor] Now that you've had time to work on a challenge, let's dive into the solutions. First, let's take a look at the sender's email address. Fraudsters often use email addresses that seem legitimate but have subtle differences. But this email sender is a generic Gmail account but it's claiming to be a part of a fictional company, your bank. Next, let's examine the email's tone. The first line states that access is restricted until the user verifies their information by clicking the link. This is a common tactic scammers use to make you panic and act hastily. You can also notice that there is generic greetings. While there are no spelling or grammatical errors that's not as important because that's low-hanging fruit and any spell check like service can correct that such as Grammarly. Despite claiming to never ask for personal information in the text, it's also asking you to click the link. They…

Contents