Free Removal Playbook →

How to Stop Phishing Emails (And Why They Know Your Name)

You get an email that looks like it’s from your bank. It uses your real name. It references your actual address. It even mentions a recent transaction that seems familiar. Everything about it screams legitimate — except it’s not. It’s a phishing email, and the scammer behind it knows your personal details because data brokers sold them.

Phishing isn’t just about bad grammar and Nigerian prince scams anymore. Modern phishing emails are sophisticated, personalized, and incredibly convincing — because the criminals sending them have access to your personal information through data broker sites and data breaches.

This guide explains how phishing actually works in 2026, why scammers know so much about you, and how to protect yourself at the source.

In this guide:

  • How modern phishing emails work
  • Why scammers know your name and personal details
  • How to spot phishing emails
  • How to stop phishing at the source
  • What to do if you’ve already clicked a phishing link

Quick action: The more personal information available about you online, the more convincing phishing attacks become. Run a free Optery scan to see how much of your data is exposed on data broker sites right now.

Why Phishing Emails Know Your Name

Here’s the question most people never think to ask: how do scammers know your real name, address, employer, and other personal details when sending phishing emails?

The answer is simpler — and more disturbing — than most people realize:

Data brokers sell your information publicly. Your name, email address, home address, phone number, employer, family members, and more are listed on hundreds of data broker sites. Scammers harvest this information to personalize phishing emails. When a scammer knows your name, employer, and bank (often inferable from your location and demographics), they can craft an email that looks indistinguishable from a legitimate one.

Data breaches provide your email and password. When companies get hacked, your email address and often your password get leaked. Criminals combine this with data broker information to build a complete profile: your email (from the breach) + your name, address, and employer (from data brokers) = a highly targeted phishing attack.

Social media fills in the gaps. Your Facebook posts about a recent vacation, your LinkedIn job change, your Instagram check-in at a restaurant — all of this gives scammers context they use to make phishing emails feel timely and relevant.

The bottom line: phishing emails are personalized because your personal information is widely available. The less information about you that exists online, the harder it is for scammers to target you convincingly.

Run a free Optery scan to see exactly which data broker sites have your information — and how much ammunition scammers have to use against you.

How Modern Phishing Emails Work

Today’s phishing emails go far beyond the obvious scams of the past. Here’s how they operate:

Impersonation. Scammers create emails that perfectly mimic legitimate companies — matching logos, formatting, sender names, and even email addresses that look nearly identical to real ones. An email from “support@paypa1.com” (with a number 1 instead of the letter l) can easily fool someone scanning quickly.

Personalization. Using your real name, address, or other details makes the email feel legitimate. “Dear John Smith, we’ve noticed unusual activity on the account associated with 123 Main Street, Detroit, MI” sounds like it’s really from your bank — but the scammer got those details from Whitepages or Spokeo.

Urgency. Phishing emails create artificial time pressure — “Your account will be locked in 24 hours” or “Suspicious activity detected — act immediately.” This urgency overrides your critical thinking and pushes you to click before you think.

Realistic landing pages. When you click a phishing link, it takes you to a fake website that looks identical to the real company’s login page. You enter your credentials thinking you’re logging into your bank — but you’re actually handing your username and password directly to a criminal.

Targeted timing. Advanced phishing attacks are timed around events — tax season emails impersonating the IRS, holiday shopping emails impersonating retailers, pandemic-related emails impersonating health agencies. Scammers use public information to make their timing feel natural.

How to Spot Phishing Emails

Even sophisticated phishing emails have telltale signs if you know what to look for:

Check the sender’s actual email address. Hover over or click on the sender’s name to reveal the real email address. Legitimate companies use their official domain (support@paypal.com), not variations (support@paypa1-security.com). Watch for subtle misspellings and extra characters.

Look for urgency and threats. “Your account will be suspended,” “Unauthorized access detected,” “Respond within 24 hours” — legitimate companies rarely use this kind of pressure in emails. If an email makes you feel panicked, that’s by design.

Don’t click links — go directly to the website. Instead of clicking any link in the email, open your browser and type the company’s URL directly. If there’s really an issue with your account, you’ll see it when you log in normally.

Hover over links before clicking. On a computer, hover your mouse over any link to see the actual URL it points to. If the displayed text says “paypal.com” but the actual URL is “paypal-verify-account.sketchy-site.com” — it’s phishing.

Watch for generic greetings in supposedly personalized contexts. An email from “your bank” that says “Dear Customer” instead of your name may be phishing. Ironically, scammers who DO have your name from data brokers bypass this red flag entirely — which is why data broker removal matters.

Check for grammar and formatting issues. While modern phishing is better than it used to be, subtle errors in grammar, spacing, or formatting can still give it away.

Be suspicious of unexpected attachments. Never open attachments from unknown senders or unexpected attachments from known senders. When in doubt, contact the sender through a different channel to verify.

How to Stop Phishing at the Source

Spotting phishing emails is good defense. But stopping them at the source is better. Here’s how to reduce the volume and effectiveness of phishing attacks targeting you:

Step 1: Remove Your Data from Data Broker Sites

This is the most impactful step most anti-phishing guides skip entirely. When your personal information is removed from data broker sites, scammers lose the ammunition they use to personalize phishing attacks. Without your name, employer, address, and family details, their emails become generic and much easier to spot.

Optery — Our top recommendation. Free scan to see your exposure. Paid plans ($39-$249/year) automate removal from 350+ data broker sites. By cutting off the data supply, you make yourself a harder target for personalized phishing. Read our full Optery review →

Incogni — Best budget option. Covers 180+ data brokers for $6.49/month billed annually. Read our full Incogni review →

Step 2: Use Unique Passwords with 2FA

Even if you fall for a phishing email and enter your password on a fake site, two-factor authentication prevents the criminal from accessing your account. And if you use unique passwords, a compromised password from one site can’t be used to access others.

Use a password manager (Bitwarden is free) and enable 2FA on every important account — especially email, banking, and social media.

Step 3: Use a Secondary Email for Non-Essential Accounts

Keep your primary email for important accounts (banking, work, healthcare). Use a secondary email for shopping, newsletters, and online signups. If the secondary email gets breached, your primary stays clean — and phishing attempts go to an inbox you already treat with suspicion.

Step 4: Use a Secondary Phone Number

Get a free Google Voice number for online forms and signups. This prevents your real phone number from being linked to your email in data broker databases — reducing the completeness of your profile available to scammers.

Step 5: Enable Email Filtering

Most email providers have built-in phishing detection. Make sure it’s enabled:

Gmail: Phishing protection is on by default. Check Settings → Security for additional options.

Outlook: Enable “Junk Email” filtering at its highest setting. Check the Junk folder periodically for legitimate emails caught by the filter.

Apple Mail: Enable “Block Remote Content” in preferences to prevent tracking pixels in phishing emails from confirming your email is active.

What to Do If You’ve Clicked a Phishing Link

If you’ve already fallen for a phishing email, act fast:

Change your password immediately. If you entered login credentials on a phishing site, change that password right now. If you use the same password elsewhere (which you shouldn’t, but many people do), change it everywhere.

Enable 2FA. Add two-factor authentication to the compromised account immediately. This prevents the criminal from maintaining access even if they have your password.

Check for unauthorized activity. Review your account for any changes — new forwarding rules in your email, unfamiliar transactions in your banking, changed security settings on any account.

Freeze your credit if you shared financial information. If the phishing attack captured your SSN, credit card number, or bank details, freeze your credit with all three bureaus immediately.

Report the phishing email. Forward it to reportphishing@apwg.org (Anti-Phishing Working Group) and report it to the FTC at reportfraud.ftc.gov. Also report it to the company being impersonated.

Scan your device for malware. Some phishing links install malware. Run a full antivirus scan on the device you used to click the link.

Stop Being an Easy Target

Phishing emails work because scammers have access to your personal information. The more they know about you — your name, employer, address, bank, family — the more convincing their attacks become.

Cut off their data supply:

  1. Run a free Optery scan — see how much personal information is available about you on data broker sites
  2. Remove your data from broker sites — use Optery or Incogni to cut off the information that makes phishing effective
  3. Check if your email has been breached — use Have I Been Pwned to check your email
  4. Enable 2FA everywhere — your last line of defense if a phishing attack succeeds
  5. Use unique passwords — prevent one compromised password from unlocking everything

The best defense against phishing isn’t just learning to spot fake emails — it’s making sure scammers don’t have the personal details to create convincing ones in the first place.

Frequently Asked Questions

Why do phishing emails use my real name?
Scammers get your real name from data broker sites that publicly list your personal information, and from data breaches that leak your email alongside other personal details. Removing your data from broker sites makes it harder for scammers to personalize their attacks.

How do I stop phishing emails?
You can’t stop all phishing emails, but you can dramatically reduce their volume and effectiveness. Remove your personal data from data broker sites using Optery or Incogni, use email filtering, and enable 2FA on all accounts so that even successful phishing attacks can’t access your accounts.

What should I do if I clicked a phishing link?
Immediately change your password on the affected account, enable 2FA, check for unauthorized activity, and run an antivirus scan. If you shared financial information, freeze your credit immediately.

How are data brokers connected to phishing?
Data brokers publicly list your name, address, employer, phone number, and family details. Scammers use this information to create personalized phishing emails that look legitimate. Removing your data from broker sites reduces the quality and effectiveness of phishing attacks targeting you.

Can phishing emails install malware on my device?
Yes. Some phishing emails contain links that download malware, keyloggers, or ransomware. Never click links or open attachments in suspicious emails. If you already clicked a suspicious link, run a full antivirus scan immediately.

What’s the difference between phishing and spam?
Spam is unwanted marketing email — annoying but generally harmless. Phishing is a targeted attack designed to steal your credentials, financial information, or identity. Phishing emails impersonate legitimate companies and use urgency to trick you into taking action. Both are fueled by your personal data being available on data broker sites.

This post contains affiliate links. If you purchase through our links, we may earn a commission at no extra cost to you. See our affiliate disclosure for details.