{"id":2213,"date":"2019-04-07T07:46:26","date_gmt":"2019-04-07T06:46:26","guid":{"rendered":"https:\/\/globalfraudforensics.com\/fraudxpose\/?p=2213"},"modified":"2019-04-05T13:52:00","modified_gmt":"2019-04-05T12:52:00","slug":"the-12-subject-lines-that-could-indicate-your-email-is-under-attack","status":"publish","type":"post","link":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/","title":{"rendered":"The 12 subject lines that could indicate your email is under attack"},"content":{"rendered":"<p><span style=\"color: #000000;\"><strong>Cyber security experts have revealed a list of the 12 most common subject lines used in phishing emails targeting businesses.<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The list shows that fraudsters are using a combination of personalisation and pressure in an attempt to deceive victims.<\/span><\/p>\n<p><span style=\"color: #000000;\">In many cases, the language contained in the subject line of the email mimics popular terms used in the workplace to give the illusion that an urgent response is required; the idea being that an employee is more likely to open and respond to an email from a work colleague or their boss rather than a message from a stranger.<\/span><\/p>\n<p><span style=\"color: #000000;\">The data has been compiled by cybersecurity company Barracuda following an analysis of 360,000 phishing emails in a three month period.<\/span><\/p>\n<p><span style=\"color: #000000;\">The top subject lines are based around the following key phrases:<\/span><\/p>\n<ol>\n<li><span style=\"color: #000000;\"><strong>Request<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Follow up<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Urgent\/Important<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Are you available? \/Are you at your desk?<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Payment Status<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Hello<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Purchase<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Invoice Due<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Re:<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Direct Deposit<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Expenses<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Payroll<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\">[Source: Barracuda \/ ZDNet]<\/span><\/p>\n<p><span style=\"color: #000000;\">How you can protect yourself:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Don\u2019t click on the links or attachments in suspicious emails and never respond to messages that ask for your personal or financial details<\/span><\/li>\n<li><span style=\"color: #000000;\">Don\u2019t assume an email is authentic, even if someone knows your basic details (such as your name or address). Remember criminals can spoof email addresses to appear as companies you know and trust<\/span><\/li>\n<li><span style=\"color: #000000;\">Every Report Matters \u2013 if you have been a victim of fraud,\u00a0<a style=\"color: #000000;\" href=\"https:\/\/www.actionfraud.police.uk\/reporting-fraud\"><strong>report it to us online<\/strong>\u00a0<\/a>or by calling 0300 123 2040.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.actionfraud.police.uk\/blog\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\">https:\/\/www.actionfraud.police.uk\/blog\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000000;\">For Africa kindly send an email to <a style=\"color: #000000;\" href=\"mailto:info@globalfraudforensics.co.uk\">info@globalfraudforensics.co.uk<\/a> to report and discuss any fraud related issues<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security experts have revealed a list of the 12 most common subject lines used in phishing emails targeting businesses. The list shows that fraudsters are using a combination of personalisation and pressure in an attempt to deceive victims. In many cases, the language contained in the subject line of the email mimics popular terms [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[19,45,23,24,20],"tags":[],"class_list":["post-2213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-cybercrime","category-international","category-nigeria","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9\" \/>\n<meta property=\"og:description\" content=\"Cyber security experts have revealed a list of the 12 most common subject lines used in phishing emails targeting businesses. The list shows that fraudsters are using a combination of personalisation and pressure in an attempt to deceive victims. In many cases, the language contained in the subject line of the email mimics popular terms [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Fraud Xpos\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/fraudxpose\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-07T06:46:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1202\" \/>\n\t<meta property=\"og:image:height\" content=\"710\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fraudxposeng\" \/>\n<meta name=\"twitter:site\" content=\"@fraudxposeng\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/person\\\/255e996e9677952491203713922e4698\"},\"headline\":\"The 12 subject lines that could indicate your email is under attack\",\"datePublished\":\"2019-04-07T06:46:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/\"},\"wordCount\":277,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/underattack.jpg?fit=1202%2C710&ssl=1\",\"articleSection\":[\"Compliance\",\"Cybercrime\",\"International\",\"Nigeria\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/\",\"name\":\"The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/underattack.jpg?fit=1202%2C710&ssl=1\",\"datePublished\":\"2019-04-07T06:46:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/underattack.jpg?fit=1202%2C710&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/underattack.jpg?fit=1202%2C710&ssl=1\",\"width\":1202,\"height\":710},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 12 subject lines that could indicate your email is under attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#website\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\",\"name\":\"Fraud Xpos\u00e9\",\"description\":\"All you need to know about fraud, forensics, security, compliance and audit issues\",\"publisher\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#organization\",\"name\":\"Fraud Xpose\",\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/FX-Logo272x147.png?fit=272%2C147&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.globalfraudforensics.com\\\/fraudxpose\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/FX-Logo272x147.png?fit=272%2C147&ssl=1\",\"width\":272,\"height\":147,\"caption\":\"Fraud Xpose\"},\"image\":{\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/fraudxpose\\\/\",\"https:\\\/\\\/x.com\\\/fraudxposeng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/#\\\/schema\\\/person\\\/255e996e9677952491203713922e4698\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/globalfraudforensics.com\\\/fraudxpose\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/","og_locale":"en_US","og_type":"article","og_title":"The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9","og_description":"Cyber security experts have revealed a list of the 12 most common subject lines used in phishing emails targeting businesses. The list shows that fraudsters are using a combination of personalisation and pressure in an attempt to deceive victims. In many cases, the language contained in the subject line of the email mimics popular terms [&hellip;]","og_url":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/","og_site_name":"Fraud Xpos\u00e9","article_publisher":"https:\/\/facebook.com\/fraudxpose\/","article_published_time":"2019-04-07T06:46:26+00:00","og_image":[{"width":1202,"height":710,"url":"https:\/\/i1.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@fraudxposeng","twitter_site":"@fraudxposeng","twitter_misc":{"Written by":"Admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#article","isPartOf":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/"},"author":{"name":"Admin","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/person\/255e996e9677952491203713922e4698"},"headline":"The 12 subject lines that could indicate your email is under attack","datePublished":"2019-04-07T06:46:26+00:00","mainEntityOfPage":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/"},"wordCount":277,"commentCount":0,"publisher":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","articleSection":["Compliance","Cybercrime","International","Nigeria","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/","name":"The 12 subject lines that could indicate your email is under attack - Fraud Xpos\u00e9","isPartOf":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#website"},"primaryImageOfPage":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#primaryimage"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","datePublished":"2019-04-07T06:46:26+00:00","breadcrumb":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#primaryimage","url":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","contentUrl":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","width":1202,"height":710},{"@type":"BreadcrumbList","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/the-12-subject-lines-that-could-indicate-your-email-is-under-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/globalfraudforensics.com\/fraudxpose\/"},{"@type":"ListItem","position":2,"name":"The 12 subject lines that could indicate your email is under attack"}]},{"@type":"WebSite","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#website","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/","name":"Fraud Xpos\u00e9","description":"All you need to know about fraud, forensics, security, compliance and audit issues","publisher":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/globalfraudforensics.com\/fraudxpose\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#organization","name":"Fraud Xpose","url":"https:\/\/globalfraudforensics.com\/fraudxpose\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2018\/04\/FX-Logo272x147.png?fit=272%2C147&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2018\/04\/FX-Logo272x147.png?fit=272%2C147&ssl=1","width":272,"height":147,"caption":"Fraud Xpose"},"image":{"@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/fraudxpose\/","https:\/\/x.com\/fraudxposeng"]},{"@type":"Person","@id":"https:\/\/globalfraudforensics.com\/fraudxpose\/#\/schema\/person\/255e996e9677952491203713922e4698","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a180c4da52b1b133d5111c4b29c553c71aaf980f49b51be7704e34acef30cff?s=96&r=g","caption":"Admin"},"url":"https:\/\/globalfraudforensics.com\/fraudxpose\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1",1202,710,false],"thumbnail":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=300%2C177&ssl=1",300,177,true],"medium_large":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=768%2C454&ssl=1",768,454,true],"large":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1024%2C605&ssl=1",1024,605,true],"1536x1536":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1",1202,710,true],"2048x2048":["https:\/\/i0.wp.com\/globalfraudforensics.com\/fraudxpose\/wp-content\/uploads\/2019\/04\/underattack.jpg?fit=1202%2C710&ssl=1",1202,710,true]},"uagb_author_info":{"display_name":"Admin","author_link":"https:\/\/globalfraudforensics.com\/fraudxpose\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Cyber security experts have revealed a list of the 12 most common subject lines used in phishing emails targeting businesses. The list shows that fraudsters are using a combination of personalisation and pressure in an attempt to deceive victims. In many cases, the language contained in the subject line of the email mimics popular terms&hellip;","jetpack_shortlink":"https:\/\/wp.me\/p9QymB-zH","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts\/2213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/comments?post=2213"}],"version-history":[{"count":0,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/posts\/2213\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/media\/2214"}],"wp:attachment":[{"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/media?parent=2213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/categories?post=2213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globalfraudforensics.com\/fraudxpose\/wp-json\/wp\/v2\/tags?post=2213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}