โ† Back to all modules
๐ŸŽฃ
๐ŸŽฃ Threat Recognition ยท Week 4

Phishing & Fake Messages

Learn how to spot phishing emails, fake texts, and suspicious links before they trick you into giving away your info.

๐Ÿ“ Where you are in the curriculum: Week 4 of 12

Welcome to Unit 2: Recognizing Threats! You've built your foundation โ€” you understand your digital footprint, can evaluate online info critically, and have strong passwords. Now let's learn what attackers actually do to try to break through those defenses.


Phishing: More Than Just Bad Emails ๐ŸŽฃ

You probably think phishing is just those obviously fake "Nigerian prince" emails, right? Think again. Modern phishing is sophisticated, targeted, and everywhere โ€” including the apps you use daily.

The Real Threat

According to the FBI โ†—, phishing was responsible for over 80% of reported cyberattacks in 2024. And it's not just targeting big companies โ€” teens are prime targets because you:

  • Have valuable gaming accounts (Steam, Roblox, Fortnite)
  • Use social media with tons of personal info
  • Might not have the same suspicion as adults
  • Often share devices with family (access to parents' accounts)

How Modern Phishing Works

Phishing has evolved way beyond sketchy emails. Here's what it looks like now:

Attack Type Platform Example
Spear phishing Email/DM A message crafted specifically for YOU using info from your profiles
Smishing SMS/Text "Your package couldn't be delivered" texts
Vishing Phone calls Fake tech support calls
Social media phishing Instagram/TikTok Fake "verified" accounts offering brand deals
QR phishing (Quishing) Physical/Digital Malicious QR codes replacing real ones

CISA identifies โ†— a common thread across all these: social engineering โ€” manipulating your emotions (excitement, fear, curiosity) to make you act without thinking.

1 / 5

๐Ÿ›ก๏ธ CyberSafe โ€” Online safety training for the whole family.