{"id":19439,"date":"2022-03-11T17:15:45","date_gmt":"2022-03-11T13:15:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-from-online-scam\/19439\/"},"modified":"2022-03-11T17:16:21","modified_gmt":"2022-03-11T13:16:21","slug":"how-to-protect-from-online-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-from-online-scam\/19439\/","title":{"rendered":"8 more tips for spotting online scammers"},"content":{"rendered":"<p>We\u2019ve already covered the most obvious <a href=\"https:\/\/www.kaspersky.com\/blog\/online-scam-red-flags\/43212\/\" target=\"_blank\" rel=\"noopener nofollow\">signs that someone is trying to scam you online<\/a>. But it\u2019s not always easy to spot a scam at first glance. So, before you transfer money or enter card details, it\u2019s worth spending a bit more time and effort on checking e-mails and websites. To help, we\u2019ve compiled eight tips to help you do just that.<\/p>\n<h2>1. Check the e-mail address<\/h2>\n<p>Before clicking on a link in an e-mail or replying, take a closer look at the letter\u2019s <em>From<\/em> field. It consists of two parts: one for the sender\u2019s name, one (more importantly) for the actual e-mail address. The sender\u2019s name can be anything, which scammers often exploit by using the name of the company they\u2019re pretending to represent.<\/p>\n<p>But replacing the real e-mail address (the bit with the @ sign) is much harder, so this is where attackers can slip up. In most scam e-mails, the sender\u2019s real address will either have nothing to do with the company being impersonated, or look similar to the real one, but not identical \u2014 with one or more characters replaced (for example, the letter \u201cO\u201d with the number \u201c0\u201d\u009d), an extra word, etc.<\/p>\n<p>Spotted a typo or inconsistency? Or the sender\u2019s address is utter gibberish? Do not reply or click any links in it, but send it to the Spam folder straight away.<\/p>\n<h2>2. Examine the links in the e-mail<\/h2>\n<p>If the message contains hyperlinks or buttons like \u201cGet a discount\u201d, \u201cClaim your free gift\u201d, \u201cRead more\u201d, or any other obvious call to action, always check what\u2019s behind it.<\/p>\n<p>If you hover the mouse cursor over the link or button (taking care not to click by mistake), you will see the actual address of the web resource the senders want you to visit. Find the official website of the company in a search engine and compare the URL with the link in the e-mail. If the addresses do not coincide, for example, the link has a different domain (say .org or some .xyz instead of .com), do not open the page.<\/p>\n<div id=\"attachment_43912\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171553\/how-to-protect-from-online-scam-screen-1-EN.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43912\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171553\/how-to-protect-from-online-scam-screen-1-EN.jpeg\" alt=\"Always check what actually is behind a button or a link\" width=\"900\" height=\"600\" class=\"size-full wp-image-19440\"><\/a><p id=\"caption-attachment-43912\" class=\"wp-caption-text\">Always check what actually is behind a button or a link<\/p><\/div>\n<p>While you\u2019re at it, go to the official website from the search results and see if it mentions the discount\/gift\/promotion the suspicious e-mail is telling you about. If it doesn\u2019t, it\u2019s likely a scam.<\/p>\n<h2>3. Take a look at the site\u2019s security certificate<\/h2>\n<p>Some characters are so similar that the naked eye is easily deceived. Therefore, we suggest another quick way to check who owns the site \u2014 after you\u2019ve gone there. Let\u2019s consider the example of Google Chrome (in other browsers the names of menu items may differ slightly).<\/p>\n<ul>\n<li>Click the padlock to the left of the URL.<\/li>\n<li>In the window that appears, select <strong>Connection is secure<\/strong>.<\/li>\n<li>Click <strong>Certificate is valid<\/strong>.<\/li>\n<li>Make sure the <strong>Issued to<\/strong> field contains the name of the company that owns the site.<\/li>\n<\/ul>\n<div id=\"attachment_43913\" style=\"width: 2310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171600\/how-to-protect-from-online-scam-screen-2-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43913\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171600\/how-to-protect-from-online-scam-screen-2-EN.png\" alt=\"How to check a site's SSL certificate\" width=\"2300\" height=\"1400\" class=\"size-full wp-image-19442\"><\/a><p id=\"caption-attachment-43913\" class=\"wp-caption-text\">How to check a site\u2019s SSL certificate<\/p><\/div>\n<p>The padlock indicates the site is certified by an independent organization and data to and from it is encrypted. We just saw the certificate confirming this. It\u2019s fairly easy to obtain such a certificate, but not, fortunately, in another company\u2019s name. So if the name of the company or organization appears in the certificate, it can usually be trusted (just make sure the name is correct).<\/p>\n<p>What if there\u2019s no padlock? This means that data sent to and from the site is not protected and can be intercepted not only by the site owners, but by third parties also, so entering confidential information there is definitely a bad idea.<\/p>\n<h2>4. Check who registered the domain and when<\/h2>\n<p>You can view additional information about the site domain using the <a href=\"https:\/\/www.whois.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Whois<\/a> service. It provides data on all current IP addresses and domain names. Type the URL you want to check into the relevant field and see when the domain was registered and by whom.<\/p>\n<div id=\"attachment_43914\" style=\"width: 2310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171613\/how-to-protect-from-online-scam-screen-3-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-43914\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/03\/11171613\/how-to-protect-from-online-scam-screen-3-EN.png\" alt=\"Difference in Whois between corporate and private domains\" width=\"2300\" height=\"1000\" class=\"size-full wp-image-19444\"><\/a><p id=\"caption-attachment-43914\" class=\"wp-caption-text\">Difference in Whois between corporate and private domains<\/p><\/div>\n<p>The domain registration date is shown in the \u201cRegistered On\u201d line. If a site claims to be the official resource of a reputable company with a long history, yet Whois says it\u2019s only a couple of months old, you\u2019re dealing with scammers.<\/p>\n<p>It\u2019s also worth looking at who the domain is registered to. The owner\u2019s contact information can be found in the \u201cRegistrant Contact\u201d section. If the company is a serious player, at the very least its name will be shown there, and often also its address, phone number and other details.<\/p>\n<p>If the site purports to belong to a large company, but Whois displays \u201cPrivate Person\u201d in the owner field, the resource is untrustworthy. Sure, it\u2019s generally fine for a domain to be registered by an individual, but if the site claims to be part of a huge corporation, it\u2019s nothing if not suspicious.<\/p>\n<h2>5. Check the site content<\/h2>\n<p>Study the site in more detail: if it consists of just one or two pages, it\u2019s very likely to be fake. Cybercriminals use such cheap and easy sites to tout <a href=\"https:\/\/www.kaspersky.com\/blog\/burning-man-scam\/32514\/\" target=\"_blank\" rel=\"noopener nofollow\">fake Burning man tickets<\/a>, dupe <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-fake-antminer\/39398\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptoinvestors<\/a> or give away <a href=\"https:\/\/www.kaspersky.com\/blog\/scam-with-playstation-5-giveaway\/39089\/\" target=\"_blank\" rel=\"noopener nofollow\">PlayStation 5 consoles<\/a>. Official corporate sites always have lots of sections with useful information: news, company history, products and services, partners, etc.<\/p>\n<h2>6. Bookmark important sites<\/h2>\n<p>Add all sites you frequently visit to your bookmarks and open them only from there \u2014 that way you eliminate the risk of accidentally opening a fake page. It\u2019s especially important to do this for sites that you enter personal data on, be it social networks, online banks, crypto exchanges or e-mail clients. You can bookmark a site by clicking on the star icon to the right of the address bar.<\/p>\n<h2>7. Be extra careful with payments and money transfers<\/h2>\n<p>Sure, there\u2019s no need to study a site in such detail if you\u2019re going there just to read an article or watch a video. But if you\u2019re planning to enter payment details, you should do so every time. Does the website address look strange? Does the page contain typos or odd design elements? Does the page have a proper SSL certificate (see above)? Enter your details only if everything is in order.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n<h2>8. Rely on professionals<\/h2>\n<p>Even the most vigilant users sometimes make mistakes. But there\u2019s good news: website verification can be automated by using a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable solution<\/a> with spam, phishing and online fraud protection. This will detect and block any threats in real time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We reveal more cunning cybercriminal tricks and explain how to guard against scams.<\/p>\n","protected":false},"author":2598,"featured_media":19446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[80,695,240],"class_list":{"0":"post-19439","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-fraud","9":"tag-scam","10":"tag-spam"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-from-online-scam\/19439\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-from-online-scam\/23954\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-protect-from-online-scam\/9773\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-from-online-scam\/26250\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-protect-from-online-scam\/24211\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-protect-from-online-scam\/24035\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-protect-from-online-scam\/26967\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-protect-from-online-scam\/26506\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-protect-from-online-scam\/32932\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-from-online-scam\/10546\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-online-scam\/43908\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-protect-from-online-scam\/18601\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-protect-from-online-scam\/19068\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/how-to-protect-from-online-scam\/15834\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-protect-from-online-scam\/28252\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-protect-from-online-scam\/28149\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-protect-from-online-scam\/24856\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-from-online-scam\/30300\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-protect-from-online-scam\/30073\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19439"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19439\/revisions"}],"predecessor-version":[{"id":19445,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19439\/revisions\/19445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19446"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}