Slovak national Computer Emergency Response Team.
  • Contacts
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Malicious E-mail

A malicious e-mail can look just like it comes from a financial institution, an e-commerce site, a government agency or any other service or business.

It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or there is another urgent matter to address.

If you are unsure whether an e-mail request is legitimate, try to verify it with these steps:

  • Contact the company directly – using information provided on an account statement, on the company’s official website or on the back of a credit card.
  • Search for the company online – but not with information provided in the e-mail.

(Author: National Cyber Security Alliance, published under Public License)

First publication 05. 3. 2018. Last update 16. 3. 2018 14:34
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20230602-01

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.0 Identifikátor MOVEit Transfer – Zero-day kritická ...2. June 2023

SK-CERT Bezpečnostné varovanie V20230531-01

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.1 Identifikátor TIBCO EBX Add-ons – kritická ...31. May 2023

SK-CERT Bezpečnostné varovanie V20230529-10

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Apache Airflow CNCF Kubernetes – ...29. May 2023
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2023 All rights reserved - Last update 02. 06. 2023 19:45
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Report an Incident
  • Contacts
  • RSS