SaveClip

How to Spot a Phishing Attempt: A Technical Guide

Last updated: April 9, 2026

Learn to identify phishing emails, fake login pages, and social engineering attacks. Understand the red flags and technical defenses that protect your accounts.

NordVPN — Works in China
You receive an email from your bank. The subject line says your account has been locked due to suspicious activity, and you need to verify your identity immediately by clicking a link. Your heart rate climbs. You've heard about phishing, but this email looks official—same logo, same tone, same sense of urgency. You hover over the link. Should you click?

This scenario plays out millions of times a day. Phishing is the practice of tricking someone into revealing sensitive information—usually login credentials or financial details—by impersonating a trustworthy person or organization. It's not a problem you can solve with a single tool or password. It's a skill you develop by understanding how these attacks work and what to look for.

Why phishing remains effective

Phishing succeeds not because people are careless, but because it exploits a fundamental asymmetry: email and websites were designed to be visually copied with ease. A skilled attacker can create a replica of your bank's login page that is pixel-perfect. They can send an email from an address that looks almost identical to the real one. The human eye is not a reliable detector of digital forgery. This is why understanding the technical clues—the parts that are harder to fake—matters more than trying to spot design inconsistencies.

The strongest signal is the URL, or web address. When you click a link or type an address into your browser, you are instructing your device to connect to a specific computer on the internet. That computer is identified by a domain name—the human-readable part of the address. For example, the domain for your bank is something like "mybank.com." A phishing page might live at "mybank-security.com" or "m7bank.com" or "mybank.com.evil.ru." To the eye scanning quickly, these look similar. But your browser doesn't care about appearance; it connects to whatever domain the URL specifies. If the domain is wrong, you are not talking to your bank, no matter how convincing the page looks.

Red flags in email and messaging

Before you even click anything, the email itself often contains clues. Legitimate companies almost never ask you to click a link and enter your password in an email. If they suspect account compromise, they will ask you to call them directly or to navigate to their website by typing the address yourself. An email demanding that you "verify your credentials" or "confirm your identity" by clicking a link is almost certainly phishing, because the company has no secure way to verify you clicked from a legitimate device—they are relying entirely on your honesty.

Generic greetings are another signal. A real bank knows your name. If an email from your bank opens with "Dear Customer" or "Dear User," it did not come from your bank. Legitimate companies personalize communications when they have your data, and they do it to build trust. Attackers cannot easily access your name without compromising the company's database, so they avoid it.

Urgency is a powerful psychological tool, but it should raise suspicion rather than lower it. Phishing emails often claim your account will be closed, your access will be revoked, or your funds are at risk—all within hours. Real security issues do require prompt action, but they don't require you to act inside an email. If you are unsure, close the email entirely, open your web browser, type the company's domain directly, and log in. If there is actually a problem, the company's real website will show it.

Unusual sender domains are harder to spot but worth learning. If you receive an email claiming to be from Apple, look at the full sender address, not just the display name. The display name can be anything ("Apple Support"), but the actual email address reveals the truth. A real Apple email comes from a domain owned by Apple, like "apple.com" or a subdomain like "support.apple.com." If the sender address ends with "gmail.com" or "outlook.com" or any domain the company doesn't own, it is not legitimate.

Password managers as a defense

One of the most practical defenses against phishing is a password manager—software that securely stores your passwords and automatically fills them in when you visit the correct website. A good password manager checks the domain of the page you are on before autofilling. If you are on a fake page with a wrong domain, the password manager will refuse to fill in your credentials. This sounds simple, but it is powerful: your password manager becomes a second pair of eyes checking the domain, and it makes a mistake far less often than you will.

Phishing beyond email

Phishing also happens by text message (sometimes called smishing) and phone calls (vishing). A text claiming to be from your delivery service asking you to verify an address, or a call claiming to be from your internet provider asking you to confirm payment information, follows the same pattern: urgency, a request for sensitive information, and impersonation. The defenses are similar: never provide passwords or account numbers to someone who contacted you unsolicited, and verify by reaching out through an official number or website you trust.

What you cannot easily protect against

No defense is perfect. If an attacker has compromised a company's actual systems, they can send emails from the real domain and host phishing pages on real servers. If someone calls you claiming to know personal details about your life, they may have obtained that information from a data breach. Staying informed about security breaches that affect you (through official sources) helps, but it requires vigilance. The goal is not paranoia; it is to understand the attack surface well enough to avoid the most common and easiest-to-execute phishing attempts.

The path forward

Phishing is fundamentally a problem of trust and verification. You cannot trust that an email, a text, or a phone call is genuine just because it looks or sounds right. You can trust the domain you type directly into your browser, the official phone number on a company's website, and a password manager that verifies the domain before filling in your secrets. As you develop these habits, also consider learning about data breaches, password security, and how authentication works—all of these concepts are connected, and understanding the broader picture makes you less vulnerable to any single attack.