{"id":894,"date":"2019-10-02T14:01:47","date_gmt":"2019-10-02T13:01:47","guid":{"rendered":"https:\/\/www.nameshield.com\/en\/?page_id=894"},"modified":"2022-12-27T16:26:58","modified_gmt":"2022-12-27T15:26:58","slug":"fraudulent-e-mails","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/","title":{"rendered":"Fraudulent e\u2011mails"},"content":{"rendered":"\n<h1 class=\"eplus-9qGdFp eplus-wrapper wp-block-heading\"> What are <em>fraudulent e\u2011mails<\/em> ? <\/h1>\n\n\n\n<p class=\" eplus-juWstk eplus-wrapper\"><em><strong>Fraud\u00adu\u00adlent e\u2011mails<\/strong> <\/em>are e\u2011mails which can con\u00adtain infec\u00adtious attach\u00adments: Pay atten\u00adtion to these<em> <\/em><strong><em>fraud\u00adu\u00adlent e\u2011mails<\/em><\/strong> because a sin\u00adgle entry point is enough to infil\u00adtrate a net\u00adwork!<\/p>\n\n\n\n<p class=\" eplus-I8QcUG eplus-wrapper\">The aim of a trap and thus mali\u00adcious attach\u00adment\nis to pose as a legit\u00adi\u00admate file (PDF, Word doc\u00adu\u00adment, JPG image\u2026), while host\u00ading\nand hid\u00ading a mali\u00adcious code: this is what we gen\u00ader\u00adal\u00adly call Tro\u00adjans.<\/p>\n\n\n\n<p class=\" eplus-uSaeo2 eplus-wrapper\">These <strong><em>fraud\u00adu\u00adlent e\u2011mails<\/em><\/strong> can serve to <a aria-label=\"ransomware  (opens in a new tab)\" href=\"https:\/\/www.nameshield.com\/en\/glossary\/ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">ran\u00adsomware <\/a>attacks.<\/p>\n\n\n\n<h2 class=\"eplus-J20DKm eplus-wrapper wp-block-heading\"><strong>How to protect against <em>fraudulent e\u2011mails<\/em>?<\/strong><\/h2>\n\n\n\n<p class=\" eplus-S5rlwv eplus-wrapper\">The\nvig\u00adi\u00adlance is cru\u00adcial.<\/p>\n\n\n<ul class=\"eplus-wrapper wp-block-list eplus-styles-uid-6f533b\">\n<li class=\" eplus-wrapper\">Don\u2019t\nopen e\u2011mails of sus\u00adpi\u00adcious ori\u00adgin;<\/li>\n\n\n\n<li class=\" eplus-wrapper\">Don\u2019t\never open an attach\u00adment from an unknown sender or from one who is not entire\u00adly\ntrust\u00adwor\u00adthy;<\/li>\n\n\n\n<li class=\" eplus-wrapper\">Check\nthe links by hov\u00ader\u00ading the cur\u00adsor over them (with\u00adout click\u00ading) to ensure that\nthey link to trust\u00adwor\u00adthy web\u00adsites;<\/li>\n\n\n\n<li class=\" eplus-wrapper\">Nev\u00ader\nreply under the pres\u00adsure of this kind of solic\u00adi\u00adta\u00adtion and do not pro\u00adceed to any\npay\u00adment;<\/li>\n\n\n\n<li class=\" eplus-wrapper\">If\nthere is any doubt, con\u00adtact the sender through anoth\u00ader method, they will con\u00adfirm\nif it real\u00adly is a fraud attempt or not;<\/li>\n\n\n\n<li class=\" eplus-wrapper\">Be\natten\u00adtive of the qual\u00adi\u00adty of the lan\u00adguage used by the mail\u2019s sender.<\/li>\n<\/ul>\n\n\n<p class=\" eplus-rv8k4h eplus-wrapper\"><em>Please find recent cas\u00ades of fraud\u00adu\u00adlent emails on the <a aria-label=\"blog (opens in a new tab)\" href=\"https:\/\/blog.nameshield.com\/blog\/category\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are fraud\u00adu\u00adlent e\u2011mails ? Fraud\u00adu\u00adlent e\u2011mails are e\u2011mails which can con\u00adtain infec\u00adtious attach\u00adments: Pay atten\u00adtion to these fraud\u00adu\u00adlent e\u2011mails because a sin\u00adgle entry point is enough to infil\u00adtrate a net\u00adwork! The aim of a trap and thus mali\u00adcious attach\u00adment is to pose as a legit\u00adi\u00admate file (PDF, Word doc\u00adu\u00adment, JPG image\u2026), while host\u00ading and\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/\" class rel=\"bookmark\">Read More \u00bb<span class=\"screen-reader-text\">Fraud\u00adu\u00adlent e\u2011mails<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":861,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-894","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are fraudulent e-mails and how to protect against them ?<\/title>\n<meta name=\"description\" content=\"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield&#039;s glossary.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are fraudulent e-mails and how to protect against them ?\" \/>\n<meta property=\"og:description\" content=\"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield&#039;s glossary.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-27T15:26:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/fraudulent-e-mails\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/fraudulent-e-mails\\\/\",\"name\":\"What are fraudulent e-mails and how to protect against them ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\"},\"datePublished\":\"2019-10-02T13:01:47+00:00\",\"dateModified\":\"2022-12-27T15:26:58+00:00\",\"description\":\"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield's glossary.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/fraudulent-e-mails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/fraudulent-e-mails\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/fraudulent-e-mails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraudulent e-mails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are fraudulent e-mails and how to protect against them ?","description":"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield's glossary.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/","og_locale":"en_US","og_type":"article","og_title":"What are fraudulent e-mails and how to protect against them ?","og_description":"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield's glossary.","og_url":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/","og_site_name":"Nameshield","article_modified_time":"2022-12-27T15:26:58+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/","url":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/","name":"What are fraudulent e-mails and how to protect against them ?","isPartOf":{"@id":"https:\/\/www.nameshield.com\/en\/#website"},"datePublished":"2019-10-02T13:01:47+00:00","dateModified":"2022-12-27T15:26:58+00:00","description":"Please visit nameshield.com to find what are fraudulent e-mails and how to protect against these e-mails in the Nameshield's glossary.","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/en\/glossary\/fraudulent-e-mails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.nameshield.com\/en\/glossary\/"},{"@type":"ListItem","position":2,"name":"Fraudulent e-mails"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/en\/#website","url":"https:\/\/www.nameshield.com\/en\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/comments?post=894"}],"version-history":[{"count":2,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/894\/revisions"}],"predecessor-version":[{"id":2256,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/894\/revisions\/2256"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/861"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/media?parent=894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}