Get powerful threat protection

Download Norton 360 Deluxe for advanced cybersecurity that helps keep you safer from malicious links and other online threats.

Get powerful threat protection

Install Norton 360 Deluxe to help keep your device safer from malicious links.

Get powerful threat protection

Install Norton 360 Deluxe to help keep your device safer from malicious links.

Who's this for?

Answer 3 quick questions to get matched with the best protection. Firstly, choose who or what you need to cover below.

What are you most concerned about?

We'll suggest the best coverage for your concerns. Select all that apply.

How many devices do you need to protect?

For the best protection, cover every device you use online.

Creating your recommendation

norton:productquiz:iconturninggears
Did you know?
Norton technology blocks millions of cyberthreats every day.
Trusted by millions of customers around the globe.
Norton™ Mobile Security
Standard
£ 29.99
£ 29.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • Protection for 1 iPhone® or iPad®
  • Wi-Fi Security
  • Internet Security
  • Device Security
Norton AntiVirus
Plus
£ 34.99
£ 34.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PC, Mac, tablet, or phone
  • NEW! Genie Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 2GB Cloud Backup‡‡,4
  • Password Manager
Norton 360
Standard
£ 64.99£ 40 OFF*
£ 24.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PC, Mac, tablet, or phone
  • NEW! Genie Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 10GB Cloud Backup‡‡,4
  • Password Manager
  • VPN private connection
Norton Identity Advisor
Plus
£ 19.99
£ 19.99/per yr

Payment method required.
When trial ends, paid subscription starts and automatically renews at {ar}/year, unless the renewal is cancelled. Price is subject to change. Subscription details below.*

  • Financial Monitoring​
  • Credit Report and Score​18
  • Credit Alerts​18
  • Identity Restoration Support
  • Social Media Monitoring17
  • Dark Web Monitoring​§
Norton 360
Deluxe
£ 89.99
£ 89.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • NEW! Genie Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 50GB Cloud Backup‡‡,4
  • Password Manager
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
  • IP masking to hide your online activities
  • Access your favourite content across borders
  • Ad Blocker to browse without annoying ads14
  • No-log policy to ensure your privacy
  • Kill Switch to help prevent privacy exposure
  • IP Rotation and Double VPN for extra privacy
  • AI-powered protection against scams, phishing, and malware. 
  • Monitoring for your info on the dark web§
  • Password Manager to use strong passwords
  • 10GB of Cloud Backup4 for valuable files
Norton
Small Business Premium
£ 219.99
£ 219.99/first yr (Up to 5 employees)

Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Alerts on suspicious transactions on your company's bank accounts.
  • Social Media Monitoring to help you prevent admin account takeover.17
  • Business Tech Support on call 24/7, ready to assist with common tech issues and virus removal.
  • Secure VPN for a safer internet connection wherever work takes you.
  • 500 GB secure Cloud Backup for your business-critical data.21
  • Driver Updater for enhanced security and more reliable PC performance.21
Norton 360
Advanced
£ 149.99
£ 149.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • NEW! Genie Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 200GB Cloud Backup‡‡,4
  • Password Manager
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
  • Identity Restoration Support
  • Credit Report and Score18
  • Credit Alerts18
  • Stolen Wallet Assist
  • Social Media Monitoring17
  • Financial Monitoring
Norton
Small Business
£ 129.99
£ 129.99/first yr

 Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21
Norton
Small Business
£ 74.99
£ 74.99/year

Automatically renews, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21

Your personalized matches

norton:productquiz:iconshieldnumber60
60-day money-back guarantee
  • Best choice

  • Better choice

  • Good choice

*Important subscription, pricing, and offer details:

  • By subscribing, you are purchasing a recurring subscription which will automatically renew.
  • The price quoted today is valid for the offered introductory term. After that, your subscription will be billed at the applicable monthly or annual renewal price here. The price is subject to change, but we will always send you a notification email in advance.

2 Requires an automatically renewing subscription for a product containing antivirus features. For further terms and conditions, please see norton.com/virus-protection-promise.
4 Only available on Windows systems (but not in S mode or on ARM processors).
21 Utilities Ultimate, Driver Updater, Software Updater, and Cloud Backup features are only available on Windows (excluding Windows in S mode and Windows running on ARM processor).
22 Private Browser is only available on Windows (excluding Windows in S mode and Windows running on ARM processor) and Mac.
Monitoring available on Windows™ PC, iOS, and Android™ devices. Not all features available on all platforms.
§ Monitoring not available in all countries and varies based on region.

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

Phishing email examples and how to identify them

Phishing emails are designed to be convincing, but there are some obvious red flags to look out for. Learn how to spot a fake email in your inbox with these real-world phishing email examples. Then get Norton 360 Deluxe to help protect you from hard-to-detect online scams and threats.

AV Comparatives award

2025

Approved

Anti-Phishing

av test award

2025

Top Rated Product

A fish hook catching credit cards.

Phishing emails are fraudulent messages that use social engineering tactics to trick you into providing personal information, downloading infected attachments, or clicking malicious links. As cybersecurity technology improves, seemingly simple scam tactics like fake emails continue to be an effective way for scammers to prey on victims and infect devices.

We’ve rounded up some of the most popular phishing email examples to help you spot scam emails before you fall for them.

1. Social media phishing emails

Social media phishing emails can be the launchpad for Facebook, LinkedIn, TikTok, X (formerly Twitter), and Instagram scams. They usually mimic the platforms’ branding and logo to trick you into clicking malicious links or divulging sensitive data.

Phishing attacks related to social media scams often:

  • Urge you to take immediate action to prevent an account from being disabled or deleted.
  • Ask you to reset a compromised password or confirm login credentials.
  • Include an alert that someone reported you to the administrator.
A LinkedIn social media phishing example.

How to tell this is a phishing email:

In this LinkedIn scam, the user’s name isn’t specified in the greeting, which means it’s likely sent to multiple email addresses in bulk. The business name is in all capital letters throughout the email, which is not their trademark or branding. There are multiple grammar issues, which is uncommon for a reputable organisation. LinkedIn will also never ask you for your password via email.

2. PayPal phishing emails

Common PayPal scams include phishing emails that claim your account is about to be suspended or deleted, you've received a payment, or you’ve been paid too much. These emails often come with a link, prompting you to enter your password on a fake webpage.

Always log into PayPal directly to verify payments and notifications. Report suspicious emails to phishing@paypal.com and delete them from your inbox.

A PayPal phishing email with a malicious link.

How to tell this is a phishing email:

The user’s name hasn’t been specified and it’s a generic greeting. The first sentence provokes a sense of urgency, hoping the user acts without thinking. There are also grammar and spelling errors in the email if you look closely.

3. Amazon phishing emails

These days many of us shop on Amazon regularly, with multiple orders out at the same time. Amazon scammers take advantage of this by sending emails that pressure recipients to act quickly and include links to fraudulent websites. Clicking these links can lead to a malware infection or information theft.

Examples of Amazon phishing emails include:

  • Messages about locked or suspended accounts.
  • Shipping emails for items that you didn’t order.
  • Prompts to update payment info.
  • Fake gift card surveys.
An example of an Amazon phishing email requesting updated payment details.

How to tell this is a phishing email:

This Amazon phishing email comes from a suspicious email address, doesn’t include the customer’s name, and pressures the customer to update their payment information quickly.

4. Google Docs scams

Users might receive deceptive Google Docs phishing emails that appear to be from friends, coworkers, or a business offering a great deal. The emails contain a malicious link to a supposed shared Google Doc. This link leads to a fake or unsafe website mimicking the Google sign-in page, where entering credentials grants scammers access to the user’s Google account.

A Google Doc phishing email.

How to tell this is a phishing email:

This Google Docs phishing scam contains a link from an unknown contact, is addressed to “Redacted,” implies urgency, and the sender’s email address in the copy of the email looks suspicious.

5. Suspended account phishing emails

A suspended account phishing email scam is a cyberattack where scammers pose as legitimate companies claiming your account is suspended. They commonly cite reasons like suspicious activity, expired payment methods, or terms of service violations.

Once you click a link, you’ll be redirected to a fake website that looks like a legitimate login page, where scammers capture sensitive information.

A phishing email about a suspended Netflix account.

How to tell this is a phishing email:

There are spelling and grammar mistakes throughout the email. The customer's name is missing from the greeting and the “To:” field is completely blank, meaning the email was likely part of a larger phishing campaign sent to multiple email addresses.

6. Unusual activity phishing attempts

Unusual activity phishing emails warn you about suspicious activity on your account and urge you to click a link to log in, change your password, or verify your account. Clicking the link sends you to a fake login page that looks like the business’s official page. Entering your details sends your information to a hacker, who can then access your account.

If you receive an email about usual activity, always independently navigate to the site or account via your web browser, without clicking any links in the email you received. If you’re concerned about unusual activity, you can change your password directly through the site or account affected.

An example of an unusual activity phishing email.

How to tell this is a phishing email:

It mentions Internet Explorer in the sign-in details, which is now a defunct web browser, and the login date listed is years ago. If you hovered over the links in the email, you’d probably notice the URLs aren’t what you expect either.

7. CEO phishing emails

CEO phishing emails come from scammers impersonating high-level executives like CEOs. This type of phishing—also known as executive phishing—targets employees, requesting personal information or imploring them to perform urgent tasks like completing wire transfers to vendors or clients. The result is the theft of funds or sensitive data.

A CEO phishing email requesting an urgent transfer be processed.

How to tell this is a phishing email:

The first thing to notice in this CEO phishing email example is the sender’s email doesn’t match the email in their email signature. The classic tactic of urgency is employed, giving the recipient little time to consider the request. There are also grammatical errors and an unusual tone of voice—e.g., the CEO likely wouldn’t use formal language like “please find enclosed” to a CFO with whom he works closely.

8. Fake job scams

Fake job phishing emails, often promising high pay and no skills required, aim to lure people into work-from-home scams. These fraudulent job offers can involve upfront fees or ask for personal information such as Social Security numbers and bank details to get started. They can also include attachments with malware.

A fake job opportunity phishing email.

How to tell this is a phishing email:

You can identify this fake job email because it’s sent from a suspicious email address—it should come from a .org instead of a .edu address. There are also some grammar issues, which you wouldn’t expect from UNICEF. The email has been sent to a work email (presumably to look like it’s from a headhunter), but they ask the recipient to provide their personal email. Finally, the attachment is titled “Unicef Employment,” which doesn’t match the organisation’s branding.

9. Apple phishing attacks

This type of phishing email targets users by impersonating Apple services like the App Store or iCloud, trying to trick them into revealing their Apple ID and password. Scammers might include messages warning about security issues, offering storage upgrades, sending fake purchase receipts, or claiming problems with Apple Pay.

These emails contain links to fake websites that mimic Apple's login page. With a user’s Apple ID and password, a scammer could access all the Apple services they use, leading to financial loss and identity theft.

An iCloud storage phishing email.

How to tell this is a phishing email:

You can tell this Apple iCloud phishing email is fake because it starts with "Dear Client" instead of using the user’s name, and it falsely claims that Apple offers a 4 TB iCloud storage plan. Plus, the email is sent to “undisclosed recipients,” has a name visible in the Bcc field, and uses poor grammar—more red flags.

How to recognise a phishing email

When confronted with a phishing email, there are some obvious red flags that can tip you off that it’s a scam. Here are common things you’ll find in phishing emails:

  • Generic greetings: Because scammers often target a broad set of victims at one time, they often use generic greetings like "Dear customer," or they may even skip the greeting altogether.
  • Grammatical errors: Phishing emails often contain grammatical errors, misspellings, odd capitalisation, and unnatural phrasing. While typos happen, legitimate business emails shouldn’t have these mistakes.
  • Low-resolution logos or images: Scammers often use copied logos to appear legitimate, but low-quality, blurry, or improperly sized logos are red flags. Be cautious if a logo looks fuzzy, pixelated, stretched, or requires close inspection to see it clearly.
  • Suspicious sender email addresses: Look closely at the sender's email address. Phishers might create addresses that look similar to a real company, but with a minor typo or extra character. For example, “appel.com” instead of “apple.com.”
  • Strange URLs: Legitimate companies use clear URLs while phishing emails often link to suspicious ones. Hover your mouse over the link to see the URL before you click it.
  • Requests for personal information: Legitimate companies won't ask for sensitive information like passwords or Social Security numbers through email. If an email tells you to verify your account by clicking a link and entering your login details, it's likely a phishing attempt.

If you receive a suspicious email but aren’t sure if it’s legit or not, use a scam detection tool like Norton Genie. Take a screenshot of the suspicious email, then paste it into Norton Genie (being careful not to click any links in the email body!). Genie will then help you identify whether or not the email is a scam.

Looking out for the clues above will help you recognise potential phishing emails and avoid being scammed. But as you can see in some of the example emails, it’s not always easy to spot a fake email. That’s why you need strong antivirus software on all your devices. That way, if you ever do click a malicious link, your device will be equipped to help you detect and block the malware.

What do I do if I clicked a suspicious link in a phishing email?

If you fall for an email scam and click a suspicious link, act quickly. Here's what to do:

  • Change your password: Create a secure password using a combination of numbers, letters, and symbols, and use unique passwords for every account to help prevent credential stuffing.
  • Enable two-factor authentication (2FA): If you haven’t already, navigate to the account mentioned in the phishing email via your browser and activate 2FA (two-factor authentication). This will add an extra layer of protection against hackers trying to crack your account.
  • Run antivirus software: A thorough scan will help detect different types of malware that may have infected your device.
  • Report the phishing email: Report suspicious emails to the National Cyber Security Centre (NCSC) by forwarding them to report@phishing.gov.uk. You can also forward smishing attack texts to SPAM (7726).
  • Alert financial organisations: If you've fallen victim to a phishing attack, alert your credit card providers and the three national credit reference agencies—Experian®, Equifax®, and TransUnion®. These entities can freeze your credit to help stop scammers from opening accounts using your identity.

Get Norton to help protect against phishing and online threats

Scammers have evolved since the days of the Nigerian Prince scam—your security software should be able to keep up too. Advanced security software like Norton 360 Deluxe helps protect you from malicious threats hiding within phishing attack emails and other hard-to-detect online threats.

In fact, Norton blocked over 200 million phishing and scam threats in 2023 alone. Get Norton 360 Deluxe now to help protect against phishing attacks and stay safer online.

FAQs about phishing emails

Here are answers to some frequently asked questions about common phishing emails.

How do I protect myself from phishing attacks?

There are a few key things you can do to stay safer against phishing scams:

  • Don't click links or attachments in suspicious emails.
  • Verify email addresses by looking for typos or suspicious domains (but still be careful as it could be a spoofed email).
  • Beware of urgent language meant to pressure you into acting quickly.
  • Never share personal information over email.

Can AI be used for phishing attacks?

Yes, scammers can use AI in phishing attacks. AI can personalise phishing emails, catch grammar and spelling errors, and generally make phishing attacks appear more convincing.

How can I report a phishing email?

Most email clients have a button or option to report phishing attempts. You can usually find this option by clicking the “menu” or “options” feature in the email toolbar and selecting “report.”

Dan Rafter
  • Dan Rafter
  • Freelance writer
Dan Rafter is a freelance writer who covers tech, finance, and real estate. His work has appeared in the Washington Post, Chicago Tribune, and Fox Business.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 


Want more?

Follow us for all the latest news, tips, and updates.