Home Blog Archive Internet Spear-Fishing: The Scam explained simply

Spear-Fishing: The Scam explained simply

  • Oct 25, 2025
  • 732
  • 0

In the case of Spear-Fishing (Spear-Phishing) is a particular Scam in the Internet. In this article, we explain you in a simple way, what is Spear-Fishing is exactly how the rip-off can protect and what to look for in a suspicious E-Mail to look out for.

Spear-Fishing: Simply explained

If someone operates Spear Phishing is a fraud that takes place via e-Mail. The technique is used to get confidential data. In contrast to normal Phishing, the sender is a Known or other trusted Person.

  • Attacks such as Spear Phishing, are often used by fraudsters to get sensitive data or data of a company. This includes finances, business secrets or similar sensitive information.
  • The E-Mails used in Spear-Phishing, often look as if they come from a trusted source. This could be, for example, the supervisor, a well-Known or a well-known company.
  • In fact, someone else entirely is behind the Mail but. This Person then asks you usually to do a certain act or certain data.
  • Victims of Spear-Phishing often don't notice that you were just cheated. Only if you have odd bills popping up or similar damage occurs, remind the people in the strange Mail.
Spear-Fishing by Mail (image: Pixabay)

So you protect yourself from the Scam

To protect yourself, there are several things to consider. When Spear-Phishing, you should be best to talk with the Person in question, in order to eliminate all risks.

  • First check the E-Mail of the sender. This look is almost always a low profile. At a closer Look, you will see then, but inconsistencies in the URL of the sender.
  • Check the Text of the Mail. The language is strange? You presizugeben prompted for sensitive data?
  • If you are suspicious, you should check it in more detail. You show the Mail is best to your boss or to your employees. You do not even shy away from, the sender to call them and ask for confirmation.
  • Under no circumstances open files from Mail, the. These are often viruses. In particular, fake invoices are often used. As you recognize this, we will show you in the next tip.
Virus programs do not help here (image: Pixabay)

In the next practice tips we will show you what simple Phishing is and how you fake invoices in E-Mails to detect.

YOU MAY ALSO LIKE

0 COMMENTS

LEAVE A COMMENT

Human?
1 + 3 =