{"id":150574,"date":"2026-02-03T01:09:45","date_gmt":"2026-02-03T06:09:45","guid":{"rendered":"https:\/\/davescomputertips.com\/?p=150574"},"modified":"2026-02-03T01:09:45","modified_gmt":"2026-02-03T06:09:45","slug":"beware-this-phishing-email-from-microsoft","status":"publish","type":"post","link":"https:\/\/davescomputertips.com\/beware-this-phishing-email-from-microsoft\/","title":{"rendered":"Beware This Phishing Email From &#8216;Microsoft&#8217;"},"content":{"rendered":"<div id=\"daves-3344789298\" class=\"daves-single-post-before-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p>I recently received an email supposedly coming from Microsoft. However, it is clearly a phishing email purely designed to entice users into giving up their Microsoft Account login details.<\/p>\n<p>It&#8217;s also a prime example of common phishing traits:<\/p>\n<p><a href=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email.png\"><img decoding=\"async\" class=\"alignnone size-large wp-image-150576\" title=\"\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email-640x614.png\" alt=\"phishing-email\" width=\"640\" height=\"614\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email-640x614.png 640w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email-350x336.png 350w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email-150x144.png 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2026\/01\/Phishing-Email.png 659w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<ol>\n<li>The &#8220;Microsoft&#8221; heading has been inserted using bright blue text in an attempt to make it appear more official<\/li>\n<li>The generic address &#8220;<em>Hi outlook User<\/em>&#8221; is a dead giveaway. Any legitimate email will almost certainly address the recipient by name<\/li>\n<li>The URLs obfuscated behind the embedded links are identical, both leading to a fake Microsoft account login page<\/li>\n<li>Note the attempt to create a sense of urgency: &#8220;<em>Failure to accept our new terms might lead to account deactivation<\/em>&#8220;<\/li>\n<li>The generic signature. Companies, such as Microsoft, will generally insert an official signature<\/li>\n<\/ol>\n<p>BOTTOM LINE:<\/p>\n<p>I cannot remember ever receiving such an obvious phishing email. As I said earlier, this one includes pretty much all of the common phishing traits and is a prime example of what to look out for.<\/p><div id=\"daves-2292205306\" class=\"daves-single-post-in-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p>&#8212;<\/p>\n<div id=\"daves-2458334181\" class=\"daves-after-content\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"3225321574\" \ndata-ad-format=\"autorelaxed\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>I recently received an email supposedly coming from Microsoft. However, it is clearly a phishing email purely designed to entice users into giving up their Microsoft Account login details. It&#8217;s also a prime example of common phishing traits: The &#8220;Microsoft&#8221; heading has been inserted using [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":143312,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[56,66,57],"tags":[59,226],"class_list":["post-150574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-phishing-internet","category-scams","tag-phishing","tag-scam"],"_links":{"self":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/150574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/comments?post=150574"}],"version-history":[{"count":3,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/150574\/revisions"}],"predecessor-version":[{"id":150730,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/150574\/revisions\/150730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media\/143312"}],"wp:attachment":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media?parent=150574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/categories?post=150574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/tags?post=150574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}