Skip to main content
All CollectionsSecurity
How to Recognize and Handle Phishing Attempts
How to Recognize and Handle Phishing Attempts
Updated over a month ago

Cyber threats, particularly phishing, remain a significant risk to your online security. Identifying and reporting phishing attempts is essential for protecting yourself from malicious actors seeking to exploit your personal information. This is especially relevant in the crypto world, where phishing attacks are common. Here’s how you can protect yourself.


How to Identify Phishing Attempts

  1. Check the Sender's Email Address
    Legitimate organizations use email addresses that are tied to their official domain. Be cautious of emails from suspicious or generic addresses that don’t match the organization they claim to be from.

  2. Verify the URL
    Hover over any links to check the actual URL. Phishers often use misleading links that look legitimate at first glance. Always verify before clicking.

  3. Look for Spelling and Grammar Mistakes
    Professional organizations are meticulous about their communications. Phishing emails frequently contain spelling errors or awkward phrasing, which is a red flag.


How to Report Phishing Attempts

  1. Use Browser Tools
    Many modern browsers offer built-in tools to report phishing sites. Using these tools helps keep the internet safer for everyone.

  2. Contact the Legitimate Organization
    If you receive an email that seems suspicious, verify its authenticity by contacting the organization directly through official channels. Always double-check with our live support if you're unsure about any communications.


Stay Vigilant

Phishing emails often ask for personal information like your email, password, or other account details. Shock will never ask for this kind of information via email or through live support, so don’t fall for these requests. If you receive an offer that seems too good to be true, it probably is.

Your awareness is your first line of defense against phishing. Stay cautious, and always verify suspicious messages. ✅

Did this answer your question?