These are often used to track who opens the email or to make a scam look like a technical system notification. 2. Check the Sender
If you didn't expect a file, or download attachments. Here is how to handle it safely: 1. Identify the Red Flags These are often used to track who opens
Phishers want you to click before you think. These are often used to track who opens
Log in directly to the service you're using (Dropbox, WeTransfer, Google Drive) through your browser instead of clicking the email link. These are often used to track who opens
Real services usually address you by name.
Mark the email as Spam or Phishing and delete it immediately.