Spot the Phish: PayPal, Netflix & Uber

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing emails and real email messages. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

Image 1 details: The email contains a malicious attachment with .js extension. Note that the attachment tries to show it’s a PDF file (look at the icon of the file). But the extension ends with a “.js.” This is a malicious attachment typical of a phishing email.

PayPal Phishing Attempt 1 Explained

Image 2 details: When you mouse-over the hyperlink, you can see that it is phishy. Also, there is a sense of urgency in the language. The email salutation is generic as well. This raises cybersecurity alarm bells.

Netflix 2 Phishing Attempt Explained

Image 3 details: The sender email ID is phishy. The salutation is completely out of line and there are grammatical mistakes. Phishing email.

Netflix 3 Phishing Attempt Explained

Image 4 details: The hyperlink is a legitimate uber website link. Although you should always have high cybersecurity awareness, there aren’t any typical red flags in the email.

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Cyber Insurance Audits: What IT Auditors Need to Know

Cyber Insurance Audits: What IT Auditors Need to Know

This article explores the type of cyber insurance policies companies in the marketplace and the role of IT auditors in making sure that cybersecurity standards are met …
PCI DSS Certification

The Most Common Problems with PCI DSS Certification Implementation

This article dissects the most common problems organizations face with PCI DSS certification implementation and the solutions to overcome them …
IT Risk Assessment

Top 10 IT Audit Risks in 2025 and Using IT Risk Assessments to Mitigate Them

This article explores the top 10 IT audit risks for 2025 and provides actionable strategies for mitigating them, notably the use of IT risk assessments …