Inspect the real sender domain, not just the friendly name. Check reply-to differences, DKIM signatures, and SPF or DMARC alignment when available. Treat HTML emails that hide long URLs behind buttons skeptically, and prefer visiting services by typing addresses or using trusted bookmarks.
Many chat apps strip tracking but also truncate addresses, making risky hosts look ordinary. Use long-press previews carefully, disable automatic link opening, and never authenticate through chat links. If someone you know sends something unusual, verify with a quick call or a separate conversation.
Fraudsters plant malicious links in comments or send urgent DMs claiming giveaways, job offers, or account warnings. Check profile age, post history, and follower patterns. Report suspicious activity, avoid off-platform chats, and stick to official pages for support rather than links shared by strangers.
Close suspicious pages, force-quit the browser, and enable airplane mode if something begins downloading unexpectedly. From a separate device, change passwords and invalidate sessions. If your organization provides incident contacts, notify them early. Quick action limits exposure, buys investigation time, and often prevents a minor scare from escalating.
Run a full malware scan, update the operating system, rotate passwords, and check account forwarding rules or unauthorized apps. Review cloud sessions and revoke stale tokens. Restore from backups if tampering appears. Keep notes on each step, creating a clear timeline that simplifies support conversations later.
Share sanitized screenshots, sender details, and the suspicious address with your security team or platform abuse portals. Reporting improves blocklists and protects others. Reflect on the trigger that worked on you, then adjust a habit or add a tool, and share the lesson graciously with colleagues.
All Rights Reserved.