{"id":27690,"date":"2019-09-25T15:38:00","date_gmt":"2019-09-25T13:38:00","guid":{"rendered":"https:\/\/perseus.de\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/"},"modified":"2026-03-30T17:48:05","modified_gmt":"2026-03-30T15:48:05","slug":"how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/","title":{"rendered":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27690\" class=\"elementor elementor-27690 elementor-23123\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27689\" alt=\"Header Sheet Magnifier\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bbe10cb e-flex e-con-boxed e-con e-parent\" data-id=\"3bbe10cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-def3f84 e-con-full e-flex e-con e-child\" data-id=\"def3f84\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4c1e905 e-con-full e-flex e-con e-child\" data-id=\"4c1e905\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8514a7 elementor-widget elementor-widget-text-editor\" data-id=\"a8514a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>25.9.2019  <\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a162ed elementor-widget elementor-widget-heading\" data-id=\"8a162ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How do I recognize a scam email? The 12-point checklist for phishing, spam and co. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fad237b elementor-widget elementor-widget-text-editor\" data-id=\"fad237b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing | Cybersecurity | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2eeaf6 elementor-widget elementor-widget-image\" data-id=\"c2eeaf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"439\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-1024x562.png\" class=\"attachment-large size-large wp-image-26868\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-1024x562.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-300x165.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-768x421.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-1536x842.png 1536w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/sbc_macbook_device_v2-2048x1123.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e52863b e-con-full e-flex e-con e-child\" data-id=\"e52863b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f027b7 elementor-widget elementor-widget-text-editor\" data-id=\"9f027b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Who doesn&#8217;t know it, the e-mail inbox is overflowing and you laboriously click through the list of unopened messages. Criminals hope for the one moment when concentration wanes and the thoughtless recipient clicks on the dubious link or infected attachment. Maybe he also discloses confidential data?  <\/strong><\/p><p>Email is the number one gateway for cybercriminals. Unfortunately, there is no such thing as absolute security against viruses and cyberattacks, so it is important that you regularly back up your data and store it outside your computer. Do not use the same password for multiple accesses and keep yourself up to date, e.g. through online training and phishing simulations for Perseus customers.  <\/p><p>If the email seems suspicious to you, don&#8217;t reply, never click on any links and don&#8217;t open any attachments. They alone are the last defense against attacks by criminals, so do not be afraid to contact the sender directly if you are unsure and have the sending of the e-mail confirmed. Do not use the contact details from the e-mail, but those from your address book or from the sender&#8217;s official website.  <\/p><p>We have put together a small checklist for you to use to check your suspicious emails:<\/p><p><strong>1. Suspicious subject line<\/strong><\/p><p>Most of the time, you will notice the first inconsistencies in the subject line. The sender&#8217;s wording is different from what you are used to. Maybe the topic is surprising and you didn&#8217;t expect that this person\/organization would write to you about this topic? Then be vigilant and check the rest of the email carefully.   <\/p><p>Of course, it can also be the case that the subject line is completely inconspicuous and there is still an attempt at fraud behind the email<\/p><p><strong>2. Conspicuous sender address<\/strong><\/p><p>Have you only received letters from the recipient so far? So far, you have had no relationship with the sender at all? Something seems strange about the sender address? Then take a closer look.   <\/p><p>In particular, check the ending of the sender address, i.e. the part after the @ sign (e.g. info@perseus.de). Do the country code (.de \/ .net \/ .org \/ .com) and the domain (perseus.de) match the usual sender and the official website? <\/p><p>Criminals like to confuse their targets with very similar sender addresses, e.g. infoperseus@gmx.de or info@perseus.net.<\/p><p>Unfortunately, however, it is also possible to credibly falsify the sender address for criminals. Make sure that your email provider supports a method that authenticates sending servers (e.g. DKIM) and thus prevents fake senders from going undetected. <\/p><p>Therefore, you should always listen to your gut feeling and look out for other scam characteristics. If you are unable to clear out your conflict, you should contact the sender directly. Of course, not via the contact details in the e-mail or simply sending a reply, but by using information from your address book or visiting the official website. Confirm the sending of the e-mail in this way.   <\/p><p><strong>3. Unusual recipient address<\/strong><\/p><p>In addition to the sender address, check your own recipient address thoroughly. If, for example, you are unexpectedly contacted on your business e-mail address by your private bank, your personal shopping provider or an old school friend, it could be an attempt at fraud. Always ask yourself, why should this person or organization write to this email address.  <\/p><p>As a general rule, do not use your professional e-mail address for private purposes. By strictly separating both mailboxes, you reduce the risk of successful cyberattacks, as criminals have fewer starting points to manipulate them. <\/p><p><strong>4. No personal salutation<\/strong><\/p><p>Another indication of a phishing email or similar can be the lack of personalization. If you are addressed with generalities (e.g. Dear Customer, Ladies and Gentlemen), although the sender usually calls you by your first and\/or last name, then you should be suspicious. <\/p><p><strong>5. Spelling and grammar errors<\/strong><\/p><p>Lack of knowledge of spelling, grammar, or punctuation can also be a feature of fraudulent emails. Often, the criminals do not come from the recipient country. They then try to translate the whole thing with the help of translation machines or with school language skills. This is often noticeable in the message   <\/p><p><strong>6. Unusual language<\/strong><\/p><p>Also, listen up if the sender suddenly writes to you in another language, such as English, instead of German as usual. Even if he unexpectedly chooses different formulations (e.g. &#8220;Siezen&#8221; instead of &#8220;Duzen&#8221;, colloquial language instead of formal expression) than in previous correspondence, you should become suspicious and take a closer look at the e-mail. <\/p><p><strong>7. Artificial pressure<\/strong><\/p><p>Even if the sender puts you under pressure, it can be a sign of criminal intentions. The form of pressure can vary: time pressure, social pressure, fear of negative consequences, but also positive pressure such as the prospect of winning or getting a promotion. Typical formulations that should make you sit up and take notice are: setting a very short deadline, prohibiting further coordination with colleagues, threatening legal consequences or inability to operate. Don&#8217;t let yourself be put under pressure and take your time to get the necessary information.   <\/p><p>Example: In a recently disclosed case, an employee transferred a large sum of money to an unknown account. He received a \u2013 manipulated \u2013 email from the company&#8217;s managing director. In it, the employee was asked to transfer the money as soon as possible, but not to call him and not to inform anyone else in the company because it was allegedly a secret company acquisition.  <\/p><p><strong>8. Links and attachments (in an unusual context)<\/strong><\/p><p>You should generally be attentive to the links and attachments it contains. Often you can only tell by small irregularities that they are not trustworthy: <\/p><p><em><strong>Links<\/strong><\/em><\/p><p>Notice if you recognize the linked domain. To do this, you should hover over the link with your mouse pointer, stop (don&#8217;t click!) and take a closer look at the link address that is displayed as the destination. Especially if the linked text pretends to be a destination address that differs from an address displayed in the email body, caution is advised. Here&#8217;s an example you can use to see if you can see if the actual destination is different from the link shown: <a href=\"http:\/\/bit.ly\/2m1aILl&nbsp;\">https:\/\/perseus.de<\/a> This link doesn&#8217;t point to the displayed address, but actually <a href=\"http:\/\/bit.ly\/2m1aILl&nbsp;\">to bit.ly\/2m1aILl <\/a>   <\/p><p>You must also be careful with links that point to pages where you are then supposed to log in, popular targets are online banking sites, shop pages and payment services such as PayPal. It is very common to claim that you have to confirm your password again to avoid financial losses or the like. Often, these login pages are spoofed or compromised to steal your login credentials. Once opened in the browser, it is sometimes difficult to determine whether you are on the right page. It is safer to open the corresponding pages yourself, e.g. via your saved browser bookmarks.    <\/p><p>A popular trick is also to fool the recipient into believing that an attachment is supposedly trustworthy. In fact, however, even a purported file attachment only hides a link to a website that tries to infect your computer.<br>Note that the detection rate of dangerous links by email scanners is significantly lower than the malware detection rate in attachments. Therefore, it does not mean that a link is 100 percent safe if the malware scanner does not find a clue. Maybe the link is just too new or not widespread enough to have been noticed by the Link Scanner.   <\/p><p><em><strong>Email attachments:<\/strong><\/em><\/p><p>Modern cyberattacks regularly spread via e-mails that are sent unnoticed in the name of the infected computers and owners. Attachments are often sent with the same name and type that has already appeared in communication with the recipient. Of course, the Perseus e-mail scanner and an up-to-date virus scanner that runs on the computer help here.  <\/p><p><b>A trained eye can also help<\/b><\/p><p>If you have a file extension with .exe, .html, .vbs, bat, .adp, .cpl, com, .wsc and others, you should prick up your ears. These can be programs that hide malware.<br>Office files (doc\/.docx\/.ppt\/.pptx\/.xls\/xlsx) can also be infected with malware due to the macros they contain. It is worth taking a closer look at the sender here.<br>Malware can also be hidden in compressed files (.zip) and videos (.mpg \/.avi etc.), which then nestles in your system when opened.<br>Text files such as .txt and PDFs are usually harmless. However, pay attention to software updates from the provider and be attentive to the links contained therein.  <\/p><p>The prerequisite for observing the above points is that your e-mail program displays all file extensions in full. A popular trick is to visually shorten the file extension so that it appears harmless. In the incomplete display, the file appears as follows: &#8220;DokumentA.jpg&#8221; \u2013 this is how it looks harmless. Finally, in the full presentation, you can see the &#8220;DokumentA.jpg.exe&#8221; threat. Whether the extensions of file attachments are displayed depends on the settings of your e-mail program and your operating system.    <\/p><p>Even if the Perseus e-mail scanner does not report any findings, trust your own mind: If you still have doubts despite a careful examination, it is better to consult the sender again. Do not use the contact details from the e-mail, but those from your address book or from the official website. A virus usually does not answer such emails, and you may even be able to help the sender determine that their computer has been infected.  <\/p><p><strong>9. Unusual content \u2013 asking for confidential information  <\/strong><\/p><p>You are asked for access data by e-mail, the boss asks for a transfer from your vacation or you should confirm a payment with the help of a link? Is an unexpected main prize, a sudden shipping notification or a sudden unsolicited application waiting in your mailbox? These can all be signs of a phishing attempt. If this has never happened before or if you are suspicious of other points, then take a closer look at the message and pay particular attention to the above notes on links and attachments.   <\/p><p><strong>10. Eye-catching formatting or design<\/strong><\/p><p>Completely destroyed the formatting of the email? Are you suddenly using different colors, images and fonts in the design than usual? Then it may be a scam message. Take a closer look at the news.   <\/p><p><strong>11. Technical support<\/strong><\/p><p>Of course, there is also technical support that you can use to screen your emails for malware and phishing links \u2013 such as the Perseus email scanner (try it for free now). However, even though the detection rates of most tools are relatively good, you should always take extra precautions. <\/p><p><strong>12. Still unsure? Contact the sender <\/strong><\/p><p>As mentioned several times: Trust your mistrust. There is no such thing as 100 percent security through technology. With the rapid development of phishing sites and malware, email and virus scanner databases may not always be up to date.  <\/p><p>You should therefore not be afraid to embarrass yourself and trust your gut feeling. Do your research and, if necessary, contact the sender directly. To do this, use the information from your address book or from an official website. Everyone will forgive you for this precaution.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Who doesn&#8217;t know it, the e-mail inbox is overflowing and you laboriously click through the list of unopened messages. Criminals hope for the one moment when concentration wanes and the thoughtless recipient clicks on the dubious link or infected attachment. Maybe he also discloses confidential data?  <\/p>\n","protected":false},"author":4,"featured_media":27689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Who doesn&#039;t know it, the e-mail inbox is overflowing and you laboriously click through the list of unopened messages. Criminals hope for the one moment when concentration wanes and the thoughtless recipient clicks on the dubious link or infected attachment. Maybe he also discloses confidential data?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-25T13:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T15:48:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"How do I recognize a scam email? The 12-point checklist for phishing, spam and co.\",\"datePublished\":\"2019-09-25T13:38:00+00:00\",\"dateModified\":\"2026-03-30T15:48:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/\"},\"wordCount\":1889,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/BloG-Header-Anzeichen-Phishing.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/\",\"name\":\"How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/BloG-Header-Anzeichen-Phishing.jpg\",\"datePublished\":\"2019-09-25T13:38:00+00:00\",\"dateModified\":\"2026-03-30T15:48:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/BloG-Header-Anzeichen-Phishing.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/BloG-Header-Anzeichen-Phishing.jpg\",\"width\":730,\"height\":412,\"caption\":\"Header Sheet Magnifier\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do I recognize a scam email? The 12-point checklist for phishing, spam and co.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/","og_locale":"en_US","og_type":"article","og_title":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies","og_description":"Who doesn't know it, the e-mail inbox is overflowing and you laboriously click through the list of unopened messages. Criminals hope for the one moment when concentration wanes and the thoughtless recipient clicks on the dubious link or infected attachment. Maybe he also discloses confidential data?","og_url":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/","og_site_name":"Perseus Technologies","article_published_time":"2019-09-25T13:38:00+00:00","article_modified_time":"2026-03-30T15:48:05+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anastasia Pamoukis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co.","datePublished":"2019-09-25T13:38:00+00:00","dateModified":"2026-03-30T15:48:05+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/"},"wordCount":1889,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/","url":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/","name":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co. - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg","datePublished":"2019-09-25T13:38:00+00:00","dateModified":"2026-03-30T15:48:05+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2019\/09\/BloG-Header-Anzeichen-Phishing.jpg","width":730,"height":412,"caption":"Header Sheet Magnifier"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/how-do-i-recognize-a-scam-email-the-12-point-checklist-for-phishing-spam-and-co\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"How do I recognize a scam email? The 12-point checklist for phishing, spam and co."}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/en\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27690"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27690\/revisions"}],"predecessor-version":[{"id":27691,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27690\/revisions\/27691"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27689"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}