How to Spot Phishing: A Practical Checklist to Avoid Scams

The Current State of Phishing

Phishing is one of the most prevalent and financially damaging forms of cyberattack. In recent years, AI-generated phishing emails have surged in sophistication, rendering the old advice of "look for awkward grammar" increasingly inadequate.

Attackers meticulously impersonate legitimate companies and services to steal login credentials, credit card numbers, and personal information. Both individuals and organizations are targeted — Business Email Compromise (BEC) alone causes billions of dollars in losses annually. Understanding phishing tactics and developing the ability to recognize them is the first line of defense in the digital age.

Email Red Flags

From an email security perspective, here are the key indicators for identifying phishing emails.

Verify the Sender Address

Display names are easily spoofed, so always check the actual sender address. Attackers frequently use lookalike domains (e.g., support@amaz0n.com, info@paypa1.com). Watch for character substitutions (o → 0, l → 1) and subdomain abuse (login.bank.example.com).

Urgency Tactics

Messages like "Your account will be suspended within 24 hours" or "Unauthorized access detected" are classic phishing techniques designed to create panic. Legitimate services rarely demand urgent action through email links. Stay calm and verify by navigating directly to the official website.

Suspicious Content

Generic greetings like "Dear Customer," unnatural phrasing, and machine-translated text are telltale signs of phishing. However, as generative AI improves, phishing emails with natural-sounding language are becoming more common — fluent text alone does not guarantee safety.

Links and Attachments

Hover over links in the email to verify that the displayed URL matches the legitimate domain. Be especially wary of shortened URLs. Never open unexpected attachments, particularly .exe, .zip, or .docm (macro-enabled) files.

Website Red Flags

Even if you click a phishing link or are redirected from search results to a fake site, knowing how to evaluate a website's authenticity can protect you.

Check the URL

Carefully inspect the URL in the address bar. Attackers use typosquatting (e.g., g00gle.com, faceb00k.com) and subdomain spoofing (e.g., login.amazon.security-check.com) to deceive users.

The HTTPS Misconception

The belief that "a padlock icon means the site is safe" is incorrect. HTTPS only indicates that the connection between your browser and the server is encrypted — it does not verify that the site is legitimate. Most phishing sites now use free SSL certificates, making HTTPS the norm rather than a trust signal.

Evaluate Site Quality

Compare the site against the legitimate version. Look for layout issues, low-quality images, broken links, or unnatural text. That said, some phishing sites are meticulously crafted, so never rely on appearance alone — always prioritize URL verification.

SMS Phishing (Smishing)

Smishing is a phishing attack conducted via SMS (text messages). With the widespread adoption of smartphones, smishing incidents have increased dramatically.

Common smishing messages include:

  • Fake delivery notifications: "We attempted to deliver your package but you were not home. Confirm here"
  • Bank security alerts: "Suspicious activity detected on your account. Verify immediately"
  • Carrier notifications: "Your payment could not be confirmed. To avoid service suspension, click here"
  • Government impersonation: "You have a tax refund available. Complete the process here"

Shortened URLs in text messages are often used to conceal the actual destination. Do not tap them casually. If the message claims to be from a legitimate service, verify through the official app or website instead.

QR Code Phishing (Quishing)

Quishing is a phishing attack that uses malicious QR codes. Because QR codes make it impossible to visually inspect the URL before scanning, they have become a growing vector for phishing.

Attackers place fake QR codes over legitimate ones in public spaces, or embed them in phishing emails. As QR codes become ubiquitous — in restaurant menus, parking meters, event flyers — the attack surface continues to expand.

As a precaution, always check the URL displayed after scanning a QR code before opening the link. Most smartphone camera apps and QR code readers offer a URL preview feature before navigating to the site.

What to Do If You Fall Victim

If you realize you have been targeted by a phishing attack, swift action is critical to limiting the damage. Follow these steps:

  • Change your passwords immediately: Update the password for the compromised service right away. If you reuse that password on other services, change those as well. Refer to our guide on creating strong passwords
  • Enable two-factor authentication: If you have not already set it up, do so now
  • Check for unauthorized activity: Review your credit card statements and bank transaction history for any unfamiliar charges
  • Report the incident: File a report with your country's anti-phishing organization and contact law enforcement's cybercrime division
  • Monitor your accounts: For a period after the incident, closely watch login notifications and account activity

Phishing is a form of social engineering — it exploits human psychology rather than technical vulnerabilities. Overconfidence in your ability to spot scams is itself the greatest risk. Maintaining constant vigilance is essential.