{"id":27294,"date":"2025-02-25T11:45:02","date_gmt":"2025-02-25T03:45:02","guid":{"rendered":"https:\/\/www.curtin.edu.au\/news\/?post_type=oasis-news&#038;p=27294"},"modified":"2025-02-05T12:24:07","modified_gmt":"2025-02-05T04:24:07","slug":"dont-get-phished-spot-email-red-flags-fast","status":"publish","type":"oasis-news","link":"https:\/\/www.curtin.edu.au\/news\/oasis-news\/dont-get-phished-spot-email-red-flags-fast\/","title":{"rendered":"Don\u2019t get phished, spot email red flags fast"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\"><em>Reading time: 2 minutes<\/em><\/h5>\n\n\n\n<p>In today&#8217;s digital age, cybercriminals increasingly use email as a primary attack vector to deceive users and gain unauthorised access to their systems. Understanding how to detect suspicious emails is an essential line of defence to help protect yourself and the wider Curtin community from cyber threats.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What to look for:<\/h4>\n\n\n\n<p>Suspicious emails can be tricky to spot. However, there are some red flags you can look out for. To get started, see the <strong>red flags<\/strong> in the example below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"939\" height=\"461\" src=\"https:\/\/www.curtin.edu.au\/news\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-27295\" srcset=\"https:\/\/www.curtin.edu.au\/news\/wp-content\/uploads\/2025\/02\/image.png 939w, https:\/\/www.curtin.edu.au\/news\/wp-content\/uploads\/2025\/02\/image-768x377.png 768w\" sizes=\"auto, (max-width: 939px) 100vw, 939px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"377\" src=\"https:\/\/www.curtin.edu.au\/news\/wp-content\/uploads\/2025\/02\/image-1.png\" alt=\"\" class=\"wp-image-27296\" \/><\/figure>\n\n\n\n<p><strong>Urgent Subject <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>Be wary of urgent emails that create panic. Read carefully before acting.<\/p>\n\n\n\n<p><strong>Generic sender <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>If the sender is unnamed or too vague, it\u2019s a warning. Hover to see the full email address.<\/p>\n\n\n\n<p><strong>Attachments <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>Unexpected attachments or ones asking for sensitive info are risky. Don\u2019t open them right away.<\/p>\n\n\n\n<p><strong>Generic greeting <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>Emails without your name are a red flag. Expect real organisations to use your name for communications, especially banks.<\/p>\n\n\n\n<p><strong>Urgent description <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>If the sender asks you to click on a link or open an attachment, be alert! Especially if the request is time sensitive. Being asked to take action to avoid a negative consequence is a common trick of cyber criminals and is often a red flag.<\/p>\n\n\n\n<p><strong>Hyperlink <\/strong>\ud83d\udea9<\/p>\n\n\n\n<p>Watch for misspelled URLs, unfamiliar websites, or links that don\u2019t match the text. Hover over links to check where they lead, and if in doubt, contact the sender directly to verify.<\/p>\n\n\n\n<p><strong>Generic signature <\/strong>\ud83d\udea9<strong><\/strong><\/p>\n\n\n\n<p>This email has a generic signature without contact details or a logo. Legitimate emails typically include a name, contact info, and company branding, so missing these can be a red flag.<\/p>\n\n\n\n<p><strong>Sender email address <\/strong>\ud83d\udea9<strong><\/strong><\/p>\n\n\n\n<p>Check for misspelled or suspicious domain names, like \u201cbankinfo.com\u201d instead of \u201cbank.com.\u201d Legitimate emails come from trusted, official sources.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What you can do:<\/h4>\n\n\n\n<p>If you receive a suspicious email to your Curtin email account, please report it using the &#8220;report email&#8221; button in Outlook. <a href=\"https:\/\/supportu.curtin.edu.au\/sp?id=kb_article&amp;sysparm_article=KB0012514\">Please visit our website<\/a> for more information on this button and how to use it.<\/p>\n\n\n\n<p>Think you have got what it takes to spot the scam?<\/p>\n\n\n\n<p>Test yourself with the Australian Cyber Security Centre\u2019s (ACSC) <a href=\"https:\/\/www.cyber.gov.au\/protect-yourself\/spotting-scams\">Can You Spot The Scam Quiz<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Further Information:<\/h4>\n\n\n\n<p>For more information on staying cyber secure, refer to the Australian Cyber Security Centre\u2019s (ACSC)&nbsp;<ins><a href=\"https:\/\/www.cyber.gov.au\/learn-basics\/view-resources\/cyber-security-awareness-month\">guide<\/a><\/ins>&nbsp;and&nbsp;<ins><a href=\"https:\/\/www.cyber.gov.au\/sites\/default\/files\/2023-03\/personal-security-guide-first_steps-summary-checklist.pdf\">checklist<\/a><\/ins>. If think you\u2019ve fallen for a scam and need assistance, visit the ACSC\u2019s&nbsp;<ins><a href=\"https:\/\/www.cyber.gov.au\/report-and-recover\/recover-from\/scams\">how to recover from scams website.<\/a><\/ins><\/p>\n\n\n\n<p><em>This article has been brought to you by&nbsp;<strong>Digital &amp; Technology Solutions<\/strong><\/em><\/p>\n\n\n\n<p><strong>#MakeCurtinCyberSafe<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Follow our tips to spot red flags \ud83d\udea9 and report suspicious emails \ud83d\udce7\ud83d\udea8. | Reading time: 2 mins<\/p>\n","protected":false},"author":4418,"featured_media":27297,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"6048,6666,4764,6107,4694,6598","_relevanssi_noindex_reason":"","wds_primary_oasis-categories":0,"footnotes":""},"oasis-categories":[141],"class_list":["post-27294","oasis-news","type-oasis-news","status-publish","has-post-thumbnail","hentry","oasis-categories-online"],"acf":{"post_options":{"":null,"banner":{"image":false}}},"featured_image":"https:\/\/www.curtin.edu.au\/news\/wp-content\/uploads\/2025\/02\/2.1-TITLE-Phishing-Scam-1000x500.jpg","author_meta":{"first_name":"Rachelle","last_name":"Erzay","display_name":"Rachelle Erzay"},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 21:48:14","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"oasis-categories","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/oasis-news\/27294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/oasis-news"}],"about":[{"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/types\/oasis-news"}],"author":[{"embeddable":true,"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/users\/4418"}],"version-history":[{"count":0,"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/oasis-news\/27294\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/media\/27297"}],"wp:attachment":[{"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/media?parent=27294"}],"wp:term":[{"taxonomy":"oasis-categories","embeddable":true,"href":"https:\/\/www.curtin.edu.au\/news\/wp-json\/wp\/v2\/oasis-categories?post=27294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}