How to Spot Phishing: A Practical Detection Guide

January 12, 2026 ยท 10 min read ยท PhishingEmail Security
Email inbox showing potential phishing threats

"Look for typos and grammar mistakes." That's the phishing advice most people get. It's also becoming useless.

Modern phishing emails are well-written, professionally designed, and convincing. Attackers use AI tools to fix their grammar. They clone real emails pixel-by-pixel. They do their research.

Here's what actually works for spotting phishing in 2026.

91% of cyberattacks start with a phishing email
$4.9M average cost of a phishing-related breach
3.4B phishing emails sent daily worldwide

The Old Advice Is Failing

"Check for Spelling and Grammar Errors"

Modern phishing emails are often flawless. Attackers use professional copywriters, steal real email templates, or use AI to polish their writing. Perfect grammar doesn't mean it's safe.

"Nigerian Prince Emails Are Obvious"

Yes, crude spam is obvious. But that's not where the real danger is. Targeted phishing (spear phishing) looks exactly like legitimate business email โ€” because it's designed to.

"Spear-phishing emails are crafted to appear as though they come from a trusted source and are tailored to the specific victim. They often contain no malicious links or attachments in the initial contact."

โ€” FBI Internet Crime Complaint Center, Annual Report

"Hover Over Links to Check Them"

Still useful, but attackers know you do this. They use lookalike domains that are hard to spot on quick inspection: microsoft-support.com, paypa1.com, app1e.com. Many people hover, glance, and click.

What Actually Matters

1. Unexpected Requests

The most reliable indicator isn't technical โ€” it's contextual. Ask yourself:

Your bank emails you to "verify your account immediately"? Did you do anything that would trigger verification? No? That's a red flag.

2. Urgency and Pressure

Phishing relies on short-circuiting your critical thinking. Common pressure tactics:

"Social engineers exploit human psychology โ€” urgency, fear, curiosity, and the desire to be helpful. The best defense is to slow down and verify through a separate channel."

โ€” SANS Security Awareness, Training Guidelines

Legitimate organizations rarely create artificial urgency. When they do need action, they usually provide multiple ways to verify.

3. The Actual Sender Address

Not the display name โ€” the actual email address. "Microsoft Support" can be the display name for any email address. Look at what's after the @.

Anatomy of an email sender showing display name vs actual address
Always check the actual email address, not just the display name โ€” they can be completely different

Examples:

The real domain is immediately before the slash in URLs and after the @ in emails. Everything else can be manipulated.

4. Link Destination vs. Context

Before clicking, hover (or long-press on mobile) to see where a link goes. Then ask: does this destination match the context?

An email from "your bank" that links to a random domain? Red flag. An email from "IT support" that links to a Google Form? Suspicious. A password reset link that goes to a URL shortener? Don't click it.

5. Requests for Credentials or Sensitive Data

Legitimate organizations almost never ask for passwords via email. They also don't ask for:

"No legitimate organization will ever ask you to provide your password via email. If you receive such a request, it is a phishing attempt."

โ€” CISA, Phishing Guidance

If an email asks for credentials, go directly to the service (type the URL yourself, don't click the link) and check if there's actually an issue.

Types of Phishing

Mass Phishing

Same email sent to thousands. Relies on volume โ€” if 0.1% click, that's enough. Usually generic: "Dear Customer," "Your account," etc.

Spear Phishing

Targeted at specific individuals. Uses research: your name, company, role, recent activities. Much harder to detect because it looks like real business email.

Example: "Hi [Your Name], following up on the Q4 budget discussion. Please review the attached spreadsheet before Friday's meeting."

Whaling

Spear phishing targeting executives. High-value targets get high-effort attacks. May involve extensive reconnaissance and carefully crafted pretexts.

Annotated example of a phishing email showing red flags
Annotated phishing email example showing common red flags. Source: Wikimedia Commons, CC BY-SA

Business Email Compromise (BEC)

Attackers compromise or impersonate a real business email account. They insert themselves into existing conversations, change payment details on invoices, or request wire transfers.

"BEC schemes have caused over $50 billion in losses globally. The average loss per incident exceeds $120,000."

โ€” FBI IC3, 2023 Internet Crime Report

These are devastating because the email comes from (or appears to come from) a trusted contact.

Smishing (SMS Phishing)

Same concept, text messages. "Your package couldn't be delivered, click here to reschedule." Short URLs make verification harder.

Vishing (Voice Phishing)

Phone calls. "This is Microsoft support, we've detected a virus on your computer." Caller ID can be spoofed, so the number appearing legitimate means nothing.

Real-World Examples

Example of a phishing email impersonating a bank
Example of a phishing email impersonating a trusted bank. Note the urgency and the request to click a link. Source: Wikimedia Commons, Public Domain

The Classic Password Reset

Subject: Unusual sign-in activity
We detected a sign-in attempt from a new device. If this wasn't you, click here to secure your account immediately.

Why it works: Creates fear and urgency. Uses real security notification templates.

Detection: Go directly to the service and check your recent activity. Don't click the email link.

The Invoice Scam

Subject: Invoice #847291 Due
Please find attached your invoice. Payment is due within 10 days. [Attachment: Invoice.pdf.exe]

Why it works: Many people process invoices without thinking. Attachment name disguises malware.

Detection: Do you have a business relationship with this sender? Check the file extension carefully.

The IT Support Impersonation

Subject: Action Required: Email Migration
We're upgrading to a new email system. Click here to migrate your mailbox and avoid losing your emails.

Why it works: IT changes are common. Fear of losing email is strong.

Detection: Did IT announce this through official channels? Verify through a separate communication.

The CEO Fraud

Subject: Urgent Wire Transfer
[From: CEO's name, spoofed or compromised email]
I need you to process a wire transfer urgently. This is confidential โ€” don't discuss with others until completed.

Why it works: Authority and urgency combined. Request for secrecy prevents verification.

Detection: Verify any unusual financial request through a different channel. Call the person directly.

When in Doubt

Verify Through a Different Channel

Got a suspicious email from your bank? Call the number on your card (not the number in the email). Email from a colleague seems off? Call or message them directly to confirm.

Go Direct

Never click email links for sensitive actions. Type the URL yourself or use a bookmark. If there's really an issue with your account, you'll see it when you log in normally.

Ask IT/Security

Most organizations want you to report suspicious emails. Forward it to your security team. It's not embarrassing to ask โ€” it's smart.

"Creating a culture where employees feel comfortable reporting suspicious emails โ€” even if they clicked โ€” is essential. Fear of punishment leads to hidden incidents and delayed response."

โ€” NIST Cybersecurity Framework, Awareness & Training

Take Your Time

Phishing relies on rushing you. Take 30 seconds to think before clicking. The urgency is almost always artificial.

Technical Indicators

For more technical readers:

What To Do If You Clicked

It happens. If you realize you've clicked a phishing link or entered credentials:

  1. Change the password immediately โ€” If you entered credentials, change that password NOW. If you reuse passwords (you shouldn't), change those too.
  2. Enable/verify MFA โ€” Add a second factor if you haven't.
  3. Report it โ€” Tell your IT/security team. They may need to check for compromised sessions.
  4. Scan for malware โ€” If you downloaded anything, run a full antivirus scan.
  5. Monitor accounts โ€” Watch for suspicious activity in the following weeks.

Speed matters. The faster you respond, the less damage an attacker can do.

Summary

Modern phishing detection comes down to:

You'll never catch 100% of phishing. The goal is to make yourself a hard target and respond quickly when something slips through.