6. Look for requests When examining the email, check for any particular, odd request. Most fraudulent e-mail talk to the receiver to answer the email or click a link in the e-mail. Nearly anything peculiar or unnecessarily urgent is most certainly a phishing scheme.Although attackers’ plans change, the general aim will be to steal own info or cre