{"id":11155,"date":"2022-10-18T12:00:02","date_gmt":"2022-10-18T10:00:02","guid":{"rendered":"https:\/\/cosh.de\/?p=11155"},"modified":"2022-05-02T09:47:59","modified_gmt":"2022-05-02T07:47:59","slug":"phishing-and-cybercrime","status":"publish","type":"post","link":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/","title":{"rendered":"Phishing and Cybercrime"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h2>Phishing: How to recognize attempted attacks<\/h2>\n<p>Almost every Internet user has received one at some point: Either in the spam mailbox or, even worse, in the normal mailbox disguised as a supposedly reputable and well-known sender. We are talking about &#8220;phishing e-mails&#8221;. But what exactly are phishing emails? Behind the term is a scam where email senders pretend to be someone else and want to capture account or log-in information from unsuspecting victims. In the worst case, one click on a fake mail can cost you a lot of money &#8211; especially if it is an alleged e-mail in the name of your bank. The word is derived from the English fishing (angling, fishing). The perpetrator thus &#8220;fishes&#8221; for passwords or installs malware by using fake emails as bait. At first glance, these emails look deceptively genuine.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h3><strong>Characteristics phishing<\/strong><\/h3>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"360\" height=\"276\" title=\"phishing1\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing1.png\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing1.png\" alt class=\"lazyload img-responsive wp-image-9242\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27360%27%20height%3D%27276%27%20viewBox%3D%270%200%20360%20276%27%3E%3Crect%20width%3D%27360%27%20height%3D%27276%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing1-200x153.png 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing1.png 360w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 360px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><h3><strong>1. wrong sender address<\/strong><\/h3>\n<p>Pay attention to the sender address first. If this looks questionable, you should be careful here. At first glance, these seem to be correct. Example: Users of the online payment service PayPal often receive phishing mails with the sender: service@paypl.com instead of service@paypal.com. In almost every phishing email, these addresses are similar, but just not identical. Sometimes sender mails also have suspicious characters in their names. Attention: The sender name displayed in the email inbox is not always the actual email address when you click on Details. In case of suspicion, check the detailed and complete sender address.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"360\" height=\"276\" title=\"phishing2\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing2.png\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing2.png\" alt class=\"lazyload img-responsive wp-image-9243\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27360%27%20height%3D%27276%27%20viewBox%3D%270%200%20360%20276%27%3E%3Crect%20width%3D%27360%27%20height%3D%27276%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing2-200x153.png 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing2.png 360w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 360px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h3><strong>2. calls to action in the text<\/strong><\/h3>\n<p>If the text asks you to take action, you should immediately become suspicious. Scammers threaten you with phrases like &#8220;If you don&#8217;t do this, we&#8217;re afraid we&#8217;ll have to block your account,&#8221; &#8220;Leave us your PIN for your online banking account to verify yourself,&#8221; etc. Rule number 1 here: Don&#8217;t let yourself be pressured. Even if you are promised the big inheritance from the Nigerian prince and you have to transfer money in advance, there is almost always a scam behind it. ( Translated with www.DeepL.com\/Translator (free version)<a href=\"https:\/\/www.spiegel.de\/netzwelt\/web\/nigerianischer-prinz-polizei-nimmt-mutmasslichen-e-mail-betrueger-in-den-usa-fest-a-1185788.html\">Spiegel article<\/a>)<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"360\" height=\"276\" title=\"phishing3\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing3.png\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing3.png\" alt class=\"lazyload img-responsive wp-image-9244\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27360%27%20height%3D%27276%27%20viewBox%3D%270%200%20360%20276%27%3E%3Crect%20width%3D%27360%27%20height%3D%27276%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing3-200x153.png 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing3.png 360w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 360px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><h3><strong>3. pay attention to salutation, spelling and grammar.<\/strong><\/h3>\n<p>Most phishing emails do not address you personally by name. The salutation is kept mostly general (&#8220;Dear users&#8221;). In most cases, such scam emails are written in English and have no signature or an incorrect signature at the end. If you receive the mail in English, look for grammatical conspicuities and spelling mistakes.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"360\" height=\"276\" title=\"phishing4\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing4.png\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing4.png\" alt class=\"lazyload img-responsive wp-image-9245\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27360%27%20height%3D%27276%27%20viewBox%3D%270%200%20360%20276%27%3E%3Crect%20width%3D%27360%27%20height%3D%27276%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing4-200x153.png 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing4.png 360w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 360px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h3><strong>4. be careful with file attachments<\/strong><\/h3>\n<p>Have you ever received a reminder, invoice or order confirmation of things you never ordered? Then scammers are trying to get you to open a file attachment. Here, first check what file format it is. Very dangerous email attachments are: .exe, .bat. , .pif, .scr, .com, .cmd or even file formats of Microsoft&#8217;s Office products that contain macros. Warning: the misconception that you are &#8220;safe&#8221; if you open the mail via smartphone or tablet to check is not true nowadays! Android and iOS are also vulnerable via email and are the target of thousands of scammers.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h3><strong>How can I protect myself from fraudulent emails?<\/strong><\/h3>\n<p>In the first place, there is a comprehensive spam filter and virus protection. With the help of appropriate anti-spam software, the risk can be significantly reduced. Manufacturers such as Kaspersky offer complete Internet security packages. In addition to a good spam filter, these also offer protection against phishing. But the best software is useless if the gateway is behind the computer. Unfortunately, damage usually occurs when people themselves act carelessly and gullibly. Regular security education and training for employees help make companies safer. We would be happy to help you find the right security solution for your company. For more information on IT security, please visit our homepage at:<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cosh.de\/en\/managed-endpoint-security\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">More about Endpoint Security<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":11156,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398,411,399],"tags":[576,406,579,578,577,403,575,404,449],"class_list":["post-11155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-guidebook","category-news","tag-cybercrime-en","tag-digital-en","tag-email-en","tag-endpoint-security-en","tag-hacking-en","tag-it-en","tag-phishing-en","tag-security-en","tag-security-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing and Cybercrime - CosH Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing and Cybercrime - CosH Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"CosH Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T10:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"495\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Erik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/\"},\"author\":{\"name\":\"Erik\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"headline\":\"Phishing and Cybercrime\",\"datePublished\":\"2022-10-18T10:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/\"},\"wordCount\":4078,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/phishing_banner.png\",\"keywords\":[\"cybercrime\",\"digital\",\"email\",\"endpoint security\",\"hacking\",\"IT\",\"phishing\",\"Security\",\"Security\"],\"articleSection\":[\"Blog posts\",\"Guidebook\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/\",\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/\",\"name\":\"Phishing and Cybercrime - CosH Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/phishing_banner.png\",\"datePublished\":\"2022-10-18T10:00:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/phishing_banner.png\",\"contentUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/phishing_banner.png\",\"width\":1500,\"height\":495},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/phishing-and-cybercrime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cosh.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing and Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\",\"url\":\"https:\\\/\\\/cosh.de\\\/\",\"name\":\"CosH Information Technology\",\"description\":\"IT-Dienstleister &amp; Service Provider N\u00fcrnberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cosh.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\",\"name\":\"Erik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"caption\":\"Erik\"},\"sameAs\":[\"https:\\\/\\\/cosh.de\"],\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/author\\\/e-kapfensteincosh-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing and Cybercrime - CosH Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Phishing and Cybercrime - CosH Information Technology","og_url":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/","og_site_name":"CosH Information Technology","article_published_time":"2022-10-18T10:00:02+00:00","og_image":[{"width":1500,"height":495,"url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png","type":"image\/png"}],"author":"Erik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erik","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#article","isPartOf":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/"},"author":{"name":"Erik","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"headline":"Phishing and Cybercrime","datePublished":"2022-10-18T10:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/"},"wordCount":4078,"commentCount":0,"image":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png","keywords":["cybercrime","digital","email","endpoint security","hacking","IT","phishing","Security","Security"],"articleSection":["Blog posts","Guidebook","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/","url":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/","name":"Phishing and Cybercrime - CosH Information Technology","isPartOf":{"@id":"https:\/\/cosh.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png","datePublished":"2022-10-18T10:00:02+00:00","author":{"@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"breadcrumb":{"@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cosh.de\/en\/phishing-and-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#primaryimage","url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png","contentUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/phishing_banner.png","width":1500,"height":495},{"@type":"BreadcrumbList","@id":"https:\/\/cosh.de\/en\/phishing-and-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cosh.de\/en\/"},{"@type":"ListItem","position":2,"name":"Phishing and Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/cosh.de\/#website","url":"https:\/\/cosh.de\/","name":"CosH Information Technology","description":"IT-Dienstleister &amp; Service Provider N\u00fcrnberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cosh.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d","name":"Erik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","caption":"Erik"},"sameAs":["https:\/\/cosh.de"],"url":"https:\/\/cosh.de\/en\/author\/e-kapfensteincosh-de\/"}]}},"_links":{"self":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/comments?post=11155"}],"version-history":[{"count":5,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions"}],"predecessor-version":[{"id":11161,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions\/11161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media\/11156"}],"wp:attachment":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media?parent=11155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/categories?post=11155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/tags?post=11155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}