Home/Blog/Tech Support/How to Spot a Phishing Email (Real Examp...
๐Ÿ’ปTech Supportยท 10 min read ยท April 1, 2026Updated April 2026
โœ“Reviewed by Alex Chen, Senior IT Specialist

How to Spot a Phishing Email (Real Examples and Red Flags)

Phishing emails cost victims $52 million in 2023 alone. Here are the 8 red flags that reveal a fake email, with real examples so you can protect yourself and your family.

A
Written by Alex Chen
Senior IT Specialist ยท 10 years experience
HelpByExperts guide to spotting phishing emails
Need help with this? Chat with a senior it specialist.
Get personalized advice for your specific situation โ€” just $3.
Chat with a tech support expert โ†’
In this article
1. What Phishing Emails Are2. Red Flag 1 and 2: Sender Address and Generic Greeting3. Red Flag 3 and 4: Urgency and Threats4. Red Flag 5 and 6: Links and Attachments5. Red Flag 7 and 8: Spelling Errors and Too-Good Offers6. What to Do If You Click a Phishing Link

What Phishing Emails Are

Phishing is a cyberattack where criminals send fake emails designed to look like they come from trusted companies such as your bank, Amazon, Apple, Netflix, or the IRS. The goal is to trick you into clicking a malicious link, entering your login credentials on a fake website, downloading malware, or providing personal information like Social Security numbers or credit card details. Phishing is the most common type of cybercrime because it works. The FBI Internet Crime Complaint Center reports that phishing caused over $52 million in losses in 2023, and the real number is likely much higher because many victims do not report it. The good news is that phishing emails follow predictable patterns, and once you learn to recognize these patterns, they become easy to spot.

Red Flag 1 and 2: Sender Address and Generic Greeting

Red Flag 1: Check the sender email address carefully. Phishing emails use addresses that look similar to legitimate ones but have subtle differences. For example, support@amaz0n-security.com instead of support@amazon.com, or noreply@apple.account-verify.com instead of noreply@apple.com. Always check the full email address, not just the display name, because scammers can set the display name to anything they want. Red Flag 2: Legitimate companies that have your account will address you by name. Phishing emails typically use generic greetings like Dear Customer, Dear User, Dear Account Holder, or Dear Sir/Madam. If an email claiming to be from your bank does not use your actual name, treat it with suspicion.

Red Flag 3 and 4: Urgency and Threats

Red Flag 3: Phishing emails create artificial urgency. They claim your account will be suspended in 24 hours, your payment failed and service will be cut off, or you must verify your identity immediately. Legitimate companies may send reminders but they do not threaten immediate account closure with a countdown timer. When you feel panicked by an email, that panic is the manipulation working as intended. Stop, breathe, and verify by contacting the company directly. Red Flag 4: Threatening consequences for inaction. Your account will be permanently deleted, legal action will be taken, you will be charged a fee, or your credit score will be affected. Real companies do not use threatening language in routine communications.

Red Flag 5 and 6: Links and Attachments

Red Flag 5: Before clicking any link, hover over it with your mouse (do not click) to see the actual URL in the bottom-left corner of your browser or email client. On mobile, press and hold the link to preview the URL. If the URL does not match the company domain exactly, it is a phishing link. For example, a link that says Click Here to Verify Your Amazon Account but the URL shows http://amzn-verify-account.sketchy-domain.com is absolutely a scam. Red Flag 6: Unexpected attachments are dangerous. Legitimate companies almost never send attachments in transactional emails. If you receive an invoice, receipt, or document you did not expect, do not open it. Malicious attachments can install ransomware, keyloggers, or other malware the moment you open them. PDF, Word, Excel, and ZIP files are the most common attachment types used in phishing.

Red Flag 7 and 8: Spelling Errors and Too-Good Offers

Red Flag 7: Professional companies have editors and proofreaders. Emails with multiple spelling mistakes, grammatical errors, awkward phrasing, or inconsistent formatting are strong indicators of phishing. However, modern phishing emails are increasingly well-written, so the absence of errors does not guarantee legitimacy. Red Flag 8: Offers that seem too good to be true are almost certainly phishing. You have won a $500 gift card, claim your free iPhone, your tax refund of $4,829.50 is ready, or you have been selected for a special promotion. If you did not enter a contest, you did not win one. Legitimate refunds and promotions are processed through official channels, not surprise emails asking you to click links.

What to Do If You Click a Phishing Link

If you clicked a phishing link and entered your credentials on a fake website, act immediately. Change the password for that account right now, from a different device if possible. Enable two-factor authentication on the account. Check for unauthorized activity such as purchases, password changes, or account modifications. If you entered financial information, call your bank immediately and report the fraud. Monitor your credit reports for the next 6 months for any unauthorized accounts. Run a full antivirus scan on the device you used. Report the phishing email by forwarding it to reportphishing@apwg.org and to the company being impersonated. The faster you act after falling for phishing, the more damage you can prevent.

Pro Tips

โœ“When in doubt, go directly to the company website by typing the address in your browser instead of clicking email links
โœ“Enable two-factor authentication on all important accounts so a stolen password alone is not enough for attackers to access your account
โœ“Report phishing emails to your email provider. Gmail, Outlook, and Yahoo all have Report Phishing options
โœ“Set up login alerts on your bank and email accounts so you are notified immediately if someone accesses your account from an unfamiliar device

Frequently Asked Questions

Can just opening a phishing email infect my computer?

Simply opening and reading a phishing email is generally safe in modern email clients. The danger comes from clicking links within the email, downloading and opening attachments, or replying with personal information. However, loading images in emails can confirm to the sender that your email address is active, so disabling automatic image loading adds an extra layer of protection.

How do phishing scammers get my email address?

Email addresses are collected from data breaches (check haveibeenpwned.com to see if your email has been exposed), social media profiles, public records, purchased mailing lists, and automated web scrapers that harvest email addresses from websites. Having your email address compromised is extremely common and not something to panic about, but it means you should be vigilant about suspicious emails.

What should I do if I gave my Social Security number to a phishing site?

Place a fraud alert on your credit reports by contacting one of the three bureaus (Equifax, Experian, or TransUnion) and they are required to notify the others. Consider placing a credit freeze which prevents new accounts from being opened in your name. File an identity theft report at IdentityTheft.gov. Monitor your credit reports monthly for at least 12 months.

Still stuck? Chat with Alex now.

Get personalized tech support help for your specific situation โ€” just $3.

Chat with Alex Chen โ€” $3 โ†’

More Tech Support Articles

HelpByExperts WiFi troubleshooting guide with router setup tips
WiFi Not Connecting? 8 Fixes That Actually Work
7 min read
HelpByExperts computer speed optimization guide for slow PCs and Macs
Computer Running Slow? 10 Ways to Speed It Up
8 min read
HelpByExperts Windows blue screen of death BSOD troubleshooting guide
Blue Screen of Death (BSOD): Causes and How to Fix It
7 min read
HelpByExperts malware removal and computer virus protection guide
How to Remove a Virus from Your Computer (Complete Guide)
8 min read

Related Articles

HelpByExperts email security guide for hacked email account recovery
Email Hacked? 8 Steps to Secure Your Account Right Now
7 min read
HelpByExperts malware removal and computer virus protection guide
How to Remove a Virus from Your Computer (Complete Guide)
8 min read
HelpByExperts VPN setup guide for beginners
How to Set Up a VPN on Any Device (Beginner Guide)
11 min read

Related Tech Support Questions

My laptop gets extremely hot and randomly shuts down after about 30 minutes of use. The fan is runni...
Answered by Alex Chen, Senior IT Specialist ยท 92 found helpful
My WiFi keeps disconnecting every 10-15 minutes on my Windows 11 laptop. My phone stays connected fi...
Answered by Alex Chen, Senior IT Specialist ยท 78 found helpful
My iPhone 14 battery used to last all day but now it dies by 2 PM. I have not installed any new apps...
Answered by Alex Chen, Senior IT Specialist ยท 65 found helpful
My desktop computer started making a loud grinding or clicking noise from inside the case. It still ...
Answered by Alex Chen, Senior IT Specialist ยท 53 found helpful
โ† All articlesTech Support ServiceQ&APrivacyTermsContact