{"id":3438,"date":"2020-09-21T11:02:27","date_gmt":"2020-09-21T11:02:27","guid":{"rendered":"http:\/\/soporteti.org\/worpress\/?p=3438"},"modified":"2020-10-19T17:02:59","modified_gmt":"2020-10-19T17:02:59","slug":"5-formas-de-detectar-un-correo-electronico-con-pishing","status":"publish","type":"post","link":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/","title":{"rendered":"5 ways to spot an email phishing, the scammers are constantly evolving."},"content":{"rendered":"<p>The scammers of this malware are constantly evolving, and their methods are becoming more crafty and difficult to locate.<\/p>\n<p style=\"text-align: left;\">Published in PCworldenespanol.com by William Pe\u00f1a<\/p>\n<p>Main illustration <a href=\"https:\/\/pixabay.com\/es\/users\/pixelcreatures-127599\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=265130\">Werner Moser<\/a> in <a href=\"https:\/\/pixabay.com\/es\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=265130\">Pixabay<\/a><\/p>\n<p>No one wants to believe that he is the victim of a\u00a0<strong>-<\/strong>\u00a0<strong><em>phishing scam<\/em><\/strong>, but the investigative report of data breaches,\u00a0<strong>Verizon<\/strong>, indicates that\u00a0<strong>30% of the\u00a0<em>phishing scam<\/em>\u00a0are opened<\/strong>, which explains the popularity of this attack. It just works. Even so, there are ways to identify this\u00a0<strong>cybercrime<\/strong>.<\/p>\n<h4 class=\"visible visible-first\">Learn 5 ways to know or detect an e-mail with phishing:<\/h4>\n<ol>\n<li><strong>Expect the unexpected.<\/strong>A report from wombat security reported that these attacks were disguised as something that an employee is expected<a href=\"http:\/\/www.pcworldenespanol.com\/2016\/01\/21\/phishing-es-derrotable-segun-phishme\/\">,<\/a>\u00a0that is to say, a document of human resources, a shipping confirmation or a request to change password that seemed to come from the it department. It is therefore advisable, if appropriate, confirm with the departments concrete if these emails are legitimate.<\/li>\n<li><strong>Verify the identity.<\/strong>Be careful if you receive an e-mail message or even an instant message from someone who is not known to log on to a web page, especially if that person requests that it waive a password or social security number. Legitimate companies never ask for this type of information via message or email. A clear example is that a bank would never ask any client account number or credit card since that is information that you already have.<\/li>\n<li><strong>Don't click on unfamiliar links.<\/strong>Normally,\u00a0<em>phishing scam<\/em>\u00a0attempt to convince victims to provide their user names and passwords so they can access their accounts online. From there, they can empty your bank accounts, make unauthorized charges on your credit cards, steal your data, read your e-mail, etc, often, will include a url embedded that will take you to a different site. At first glance, these urls can seem perfectly valid but if you place the cursor over the url, you can usually see the hyperlink real. If the hyperlink address is different from what is shown , it is probably a\u00a0<em>phishing scam<\/em>\u00a0and should not do click.<\/li>\n<li><strong>.Bad spelling and grammar<\/strong>It is highly unlikely that a corporate communications department to send messages to your customer base without corrections of spelling, grammar, editing, and revising. If the email you receive is riddled with these errors, it is a scam. You should also be skeptical of the generic greetings such as \u201cdear customer\u201d or \u201cdear member\u201d. These should raise suspicion because most companies would use a specific name in their greeting of the email.<\/li>\n<li><strong>Threats<\/strong>\u201cRequires urgent action\u201d, \u201cyour account will be closed\u201d, \u201cyour account has been compromised\u201d. These intimidation tactics take advantage of the anxiety and concern of the victims to provide their personal information. Do not hesitate to call the financial institution or company to confirm.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Los estafadores de este malware est\u00e1n en constante evoluci\u00f3n y sus m\u00e9todos se est\u00e1n volviendo m\u00e1s astutos y dif\u00edciles de localizar. Publicado en PCworldenespanol.com por [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3439,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[138],"tags":[141,35],"class_list":["post-3438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-phishing","tag-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI\" \/>\n<meta property=\"og:description\" content=\"Los estafadores de este malware est\u00e1n en constante evoluci\u00f3n y sus m\u00e9todos se est\u00e1n volviendo m\u00e1s astutos y dif\u00edciles de localizar. Publicado en PCworldenespanol.com por [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\" \/>\n<meta property=\"og:site_name\" content=\"SSTI\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T11:02:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-19T17:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adminGRW\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminGRW\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\"},\"author\":{\"name\":\"adminGRW\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448\"},\"headline\":\"5 Formas de detectar un correo electr\u00f3nico con phishing\",\"datePublished\":\"2020-09-21T11:02:27+00:00\",\"dateModified\":\"2020-10-19T17:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\"},\"wordCount\":565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg\",\"keywords\":[\"Phishing\",\"Software\"],\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\",\"url\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\",\"name\":\"5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg\",\"datePublished\":\"2020-09-21T11:02:27+00:00\",\"dateModified\":\"2020-10-19T17:02:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage\",\"url\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg\",\"contentUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg\",\"width\":800,\"height\":490},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/webssti.lcred.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Formas de detectar un correo electr\u00f3nico con phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webssti.lcred.net\/#website\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"name\":\"SSTI\",\"description\":\"Contamos con un grupo de expertos\",\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webssti.lcred.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webssti.lcred.net\/#organization\",\"name\":\"SSTI\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"contentUrl\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"width\":171,\"height\":50,\"caption\":\"SSTI\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448\",\"name\":\"adminGRW\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g\",\"caption\":\"adminGRW\"},\"sameAs\":[\"https:\/\/soporteti.org\/worpress\"],\"url\":\"https:\/\/webssti.lcred.net\/en\/author\/admingrw\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/","og_locale":"en_US","og_type":"article","og_title":"5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI","og_description":"Los estafadores de este malware est\u00e1n en constante evoluci\u00f3n y sus m\u00e9todos se est\u00e1n volviendo m\u00e1s astutos y dif\u00edciles de localizar. Publicado en PCworldenespanol.com por [&hellip;]","og_url":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/","og_site_name":"SSTI","article_published_time":"2020-09-21T11:02:27+00:00","article_modified_time":"2020-10-19T17:02:59+00:00","og_image":[{"width":800,"height":490,"url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg","type":"image\/jpeg"}],"author":"adminGRW","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminGRW","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#article","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/"},"author":{"name":"adminGRW","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448"},"headline":"5 Formas de detectar un correo electr\u00f3nico con phishing","datePublished":"2020-09-21T11:02:27+00:00","dateModified":"2020-10-19T17:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/"},"wordCount":565,"commentCount":0,"publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"image":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage"},"thumbnailUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg","keywords":["Phishing","Software"],"articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/","url":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/","name":"5 Formas de detectar un correo electr\u00f3nico con phishing | SSTI","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage"},"image":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage"},"thumbnailUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg","datePublished":"2020-09-21T11:02:27+00:00","dateModified":"2020-10-19T17:02:59+00:00","breadcrumb":{"@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#primaryimage","url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg","contentUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800.jpg","width":800,"height":490},{"@type":"BreadcrumbList","@id":"https:\/\/webssti.lcred.net\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/webssti.lcred.net\/"},{"@type":"ListItem","position":2,"name":"5 Formas de detectar un correo electr\u00f3nico con phishing"}]},{"@type":"WebSite","@id":"https:\/\/webssti.lcred.net\/#website","url":"https:\/\/webssti.lcred.net\/","name":"SSTI","description":"Contamos con un grupo de expertos","publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webssti.lcred.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webssti.lcred.net\/#organization","name":"SSTI","url":"https:\/\/webssti.lcred.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/","url":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","contentUrl":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","width":171,"height":50,"caption":"SSTI"},"image":{"@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448","name":"adminGRW","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g","caption":"adminGRW"},"sameAs":["https:\/\/soporteti.org\/worpress"],"url":"https:\/\/webssti.lcred.net\/en\/author\/admingrw\/"}]}},"_links":{"self":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts\/3438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/comments?post=3438"}],"version-history":[{"count":0,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts\/3438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media\/3439"}],"wp:attachment":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media?parent=3438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/categories?post=3438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/tags?post=3438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}