Assessing danger
Sender’s e-mail address implausible
Check whether the e-mail address corresponds to the name of the sender and if it is plausible. It is possible to forge a sender address. However, most scammers do not bother doing so.
If the e-mail address is not displayed:
- On the PC: Move the mouse cursor over the sender name without clicking on it. A window with the address will then open.
- On a smartphone or tablet: Tip on the sender’s name or the sender’s icon.

Money transfer or voucher cards requested
Be particularly careful if the e-mail contains a request to transfer money or buy gift cards (e.g. for the Google Play Store or Amazon). Do not comply with such a request. More information: Knowing dangers in e-mails – fraud
Target address of links or buttons implausible
To check the target address of links or buttons:
- On the PC: Move your cursor over the link in the e-mail without clicking it.
- On a smartphone or tablet: Press the link and hold it down. A window will open with the target address.
Check whether the link would open a website that corresponds to the sender or the context of the e-mail.

In case of uncertainty
If you are still unsure whether the message is authentic,
- obtain information about currently circulating forgeries, for example on the website Watchlist Internet (in German) or use the corresponding smartphone app for iOS or Android free of charge. Even if you cannot find the message on Watchlist Internet, it could still be a forgery.
- contact the sender using another communication channel, for example by telephone. Do not trust the contact information stated in the e-mail, but instead research them yourself.
- contact your IT representative, the ZID Helpdesk, the ZID IT security team or other qualified persons of trust.
Dealing with a fraudulent e-mail
If you suspect or are certain that the message you received is a fraudulent e-mail,
- do notopenanyattachments that the e-mail may contain.
- do not click any links in the e-mail.
- do not reply to this e-mail.
- do not forward the e-mail except to the ZID IT security team (security.zid(at)univie.ac.at) or to other qualified experts for analysis purposes. In this case, make sure to send the e-mail as an attachment in the form of an EML file. This allows for analysing the metadata of the e-mail. Follow the steps in the user guide Forwarding e-mails as an attachment.

