What is phishing?

This is a recommends products dialog
Top Suggestions
Starting at
View All >
Sign In / Create Account
language Selector,${0} is Selected
Register & Shop at Lenovo Pro
Register at Education Store
Pro Tier Benefits
• Save up to an extra 20% on Think everyday pricing.
• Spend $15K, advance for FREE to Plus Tier with increased benefits.
Plus Tier Benefits
• Save up to an extra 25% on Think everyday pricing.
• Spend $50K, advance for FREE to Elite Tier with increased benefits.
Elite Tier Benefits
• Save up to an extra 30% on Think everyday pricing.
Reseller Benefits
• Access to Lenovo's full product portfolio
• Configure and Purchase at prices better than Lenovo.com
View All Details >
more to reach
PRO Plus
PRO Elite
Congratulations, you have reached Elite Status!
Pro for Business
Delete icon Remove icon Add icon Reload icon
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
Contains Add-ons
Proceed to Checkout
Popular Searches
What are you looking for today ?
Quick Links
Recent Searches
Hamburger Menu
skip to main content

What is phishing?

Phishing is a cyber-attack where scammers try to deceive you into sharing sensitive information such as passwords, credit card details, or personal data. They often do this through emails, text messages, or fake websites that appear legitimate. The goal is to trick you into thinking you're interacting with a trustworthy entity and then steal your information for malicious purposes.

How can I recognize a phishing attempt?

There are several signs that can help you identify a phishing attempt. First, look for spelling or grammatical errors in the email or message. Legitimate organizations usually have proper proofreading in place. Second, be cautious if the message creates a sense of urgency or tries to make you panic. Scammers often use fear to pressure you into taking immediate action. Lastly, check the sender's email address or the website uniform resource locators (URL). Phishers often use slightly altered versions of legitimate addresses to trick you into thinking they're genuine.

Do scammers only use emails for phishing attempts?

No, scammers use various methods for phishing attempts. While emails are commonly used, phishing can also happen through text messages, social media messages, or even phone calls. Always be vigilant and skeptical of any unsolicited communication asking for personal or financial information.

What should I do if I receive a phishing email?

If you receive a suspicious email, it's important not to click on any links or download any attachments. Instead, mark the email as spam or phishing (if your email provider offers this option). This helps train the system to filter out similar emails in the future. If the phishing attempt appears to come from a well-known organization, you can also contact their customer support to report the incident.

What is spear phishing?

Spear phishing is a more targeted form of phishing where scammers personalize their attacks to make them appear even more convincing. They gather information about their potential victims, such as their name, occupation, or interests, and then tailor the phishing attempt accordingly. This makes it harder to detect as the email or message might contain familiar details that trick you into thinking it's legitimate.

How can I protect myself from spear phishing attacks?

Protecting yourself from spear phishing attacks requires a combination of caution and cybersecurity measures. Be mindful of the information you share online, as scammers can use it to create convincing phishing attempts. Additionally, regularly review your privacy settings on social media platforms to limit who can access your personal information. It's also crucial to stay informed about the latest phishing techniques and scams to recognize and avoid them.

Are there any tools to help identify phishing websites?

Yes, there are tools available that can help identify phishing websites. Many web browsers have built-in security features that warn you if you're visiting a potentially malicious site. Additionally, there are browser extensions and security software that provide extra protection against phishing attempts. These tools analyze website uniform resource locators (URLs) and content to detect signs of phishing and block access to harmful sites.

What should I do if I accidentally provide my information to a phishing site?

If you accidentally provide your information to a phishing site, act quickly to mitigate the damage. Change your passwords immediately for the affected accounts and enable two-factor authentication if possible. Monitor your accounts for any suspicious activity and consider contacting your bank or credit card company to report the incident. It's essential to be proactive to minimize the potential harm caused by the phishing attempt.

How can I report a phishing attempt to the authorities?

If you come across a phishing attempt, it's important to report it to the appropriate authorities. You can start by contacting your local law enforcement agency or cybercrime unit. They will be able to guide you on how to proceed and may ask for any evidence or information you have regarding the incident. Additionally, you can also report the phishing attempt to organizations like the Anti-Phishing Working Group (APWG) or the Internet Crime Complaint Center (IC3).

What are some common phishing techniques used by scammers?

Scammers employ various techniques to make their phishing attempts more convincing. One common technique is email spoofing, where they forge the sender's address to make it appear as if the email came from a legitimate source. Another technique is the use of social engineering, where they manipulate victims into revealing sensitive information through psychological manipulation or deceit. Some phishing attempts also involve creating fake websites that closely resemble the legitimate ones, tricking users into entering their information unknowingly.

Can I trust all emails that claim to be from reputable organizations?

No, not all emails claiming to be from reputable organizations can be trusted. Phishers often impersonate well-known companies, banks, or government agencies to gain your trust. Always double-check the email address, look for suspicious content or requests, and avoid clicking on links or downloading attachments unless you're certain the email is legitimate. When in doubt, contact the organization directly through official channels to verify the authenticity of the email.

What should I do if I suspect a website is a phishing site?

If you suspect a website is a phishing site, it's best to avoid interacting with it. Do not enter any personal or financial information on the site. Instead, close the browser tab or window immediately. You can also report the website to your web browser's built-in security features, which will help warn other users about the potential threat. Additionally, you can notify the legitimate organization being impersonated, so they can take appropriate action.

What is the role of multi-factor authentication in preventing phishing attacks?

Multi-factor authentication adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a unique code sent to their mobile device. This makes it more difficult for phishers to gain unauthorized access to accounts even if they have obtained the password.

What are some signs that a website may be a phishing site?

Signs that a website may be a phishing site include misspellings in the uniform resource locator (URL), an unsecured connection hypertext transfer protocol (HTTP) instead of hypertext transfer protocol secure (HTTPS), unexpected pop-ups asking for personal information, or a design that looks different from the legitimate website it is trying to mimic.

Can phishing attacks be launched through phone calls or voicemails?

Yes, phishing attacks can be launched through phone calls or voicemails. Scammers may pretend to be representatives from legitimate organizations and attempt to trick you into revealing sensitive information over the phone.

How does spear phishing differ from regular phishing?

Spear phishing is a targeted form of phishing where attackers personalize their messages to specific individuals or organizations. They gather information about their targets to craft highly convincing emails or messages, increasing the likelihood of success compared to generic phishing attempts.

coming coming
Starting at
List Price
Web Price
Web Price:
List Price
Web Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Web Price is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Learn More
See More
See Less
View {0} Model
View {0} Models
Part Number:
See More
See Less
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
Add To Cart
Add To Cart
We're sorry,
Products are temporarily unavailable.
Continue shopping
Learn More
Coming Soon
Featured Product
Top Deals of the Day
Oops! No results found. Visit the categories above to find your product.
open in new tab
© 2024 Lenovo. All rights reserved.
© {year} Lenovo. All rights reserved.
Compare  ()