{"id":91519,"date":"2024-10-07T11:00:00","date_gmt":"2024-10-07T09:00:00","guid":{"rendered":"https:\/\/blog.mailfence.com\/spam-vs-phishing-qual-e-a-diferenca\/"},"modified":"2025-09-16T16:01:12","modified_gmt":"2025-09-16T14:01:12","slug":"spam-vs-phishing-qual-e-a-diferenca","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/","title":{"rendered":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a?"},"content":{"rendered":"\n<p>Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Todos os dias, <a href=\"https:\/\/www.varonis.com\/blog\/data-breach-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">uma nova viola\u00e7\u00e3o ou vazamento de dados<\/a> vem a p\u00fablico. Isso significa que, infelizmente, a maioria dos nossos endere\u00e7os de e-mail agora est\u00e1 dispon\u00edvel gratuitamente na dark net, o que os torna um alvo f\u00e1cil para tentativas de spam e phishing.<\/p>\n\n\n\n<p>Neste guia, abordaremos tudo o que voc\u00ea precisa saber sobre spam e phishing, o que as diferencia e como evitar ser v\u00edtima de uma delas. Vamos come\u00e7ar!<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-o-que-e-spam\">O que \u00e9 Spam?<\/h2>\n\n\n\n<p>O termo spam de e-mail (ou &#8220;junk mail&#8221;, ou &#8220;spamming&#8221;) refere-se a e-mails n\u00e3o solicitados.<\/p>\n\n\n\n<p><strong>Essas mensagens s\u00e3o, em sua maioria, promocionais e t\u00eam como objetivo promover produtos ou servi\u00e7os.<\/strong><\/p>\n\n\n\n<p>Os e-mails de spam podem variar de um simples inc\u00f4modo a um comprometimento real da sua seguran\u00e7a. De fato, \u00e0s vezes eles podem conter links prejudiciais ou malware (o que pode torn\u00e1-los uma tentativa de phishing, mas falaremos mais sobre isso adiante). <\/p>\n\n\n\n<p>\u00c9 importante observar que e-mail de spam \u00e9 uma no\u00e7\u00e3o subjetiva. O que algumas pessoas consideram &#8220;spam&#8221; pode n\u00e3o ser spam para outra pessoa. Tecnicamente, o termo se refere a e-mails <em>n\u00e3o solicitados<\/em>. No entanto, ele adquiriu um significado mais amplo nos \u00faltimos anos. Vamos dar uma olhada em um exemplo:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1.jpg\" alt=\"\" class=\"wp-image-90579\" style=\"width:566px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1.jpg 600w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1-300x300.jpg 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1-150x150.jpg 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption class=\"wp-element-caption\"><em>E-mails que recebo depois de me inscrever em um boletim informativo<\/em><\/figcaption><\/figure>\n\n\n\n<p>Neste exemplo, eu me inscrevi em <a href=\"http:\/\/go.tim.blog\/5-bullet-friday-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">uma newsletter popular de Tim Ferris<\/a>. Entretanto, depois de algum tempo, parei de ler os e-mails que recebia. Agora, talvez eu considere esse remetente &#8220;spam&#8221;, embora tenha me inscrito inicialmente para receber seus e-mails.<\/p>\n\n\n\n<p>Da mesma forma, ao comprar um produto em um novo site, voc\u00ea pode (sem saber) concordar em receber e-mails de marketing, newsletters, not\u00edcias sobre produtos, etc. Nesse caso, embora tecnicamente voc\u00ea tenha se inscrito para receber esses e-mails, poder\u00e1 consider\u00e1-los rapidamente como spam.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-exemplo-de-e-mail-de-spam\">Exemplo de e-mail de spam<\/h3>\n\n\n\n<p><strong>Por fim, h\u00e1 o caso de e-mails realmente n\u00e3o solicitados.<\/strong><\/p>\n\n\n\n<p>Isso acontece quando <a href=\"https:\/\/blog.mailfence.com\/pt\/por-que-privacidade-on-line-fundamental-agora-mais-do-que-nunca-forte-argumento-criptografia\/\" target=\"_blank\" rel=\"noreferrer noopener\">seus dados s\u00e3o vazados ou compartilhados<\/a> com anunciantes. Ent\u00e3o voc\u00ea come\u00e7a a receber e-mails de remetentes dos quais nunca ouviu falar. Em 99% dos casos, esses e-mails querem vender algo a voc\u00ea ou pedir a voc\u00ea algum tipo de colabora\u00e7\u00e3o.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"706\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1024x706.png\" alt=\"Um exemplo cl\u00e1ssico de e-mail de spam\" class=\"wp-image-90573\" style=\"width:753px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1024x706.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-300x207.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-768x530.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image.png 1125w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Um exemplo cl\u00e1ssico de e-mail de spam<\/em><\/figcaption><\/figure>\n\n\n\n<p>O resultado final? Os e-mails de spam podem ser irritantes, mas n\u00e3o devem ser confundidos com golpes reais ou tentativas de phishing. \u00c9 isso que vamos explorar na pr\u00f3xima se\u00e7\u00e3o.  <\/p>\n\n\n\n<p><em>Confira este guia para saber mais sobre <a href=\"https:\/\/blog.mailfence.com\/pt\/respondendo-aos-seus-comentarios-uma-atualizacao-anti-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">como o Mailfence lida com e-mails de spam<\/a>.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-o-que-e-phishing\">O que \u00e9 phishing?<\/h2>\n\n\n\n<p>Phishing \u00e9 um tipo de ataque criado para enganar as pessoas e faz\u00ea-las compartilhar dados pessoais, como:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>N\u00famero de telefone;<\/li>\n\n\n\n<li>Senhas;<\/li>\n\n\n\n<li>Detalhes financeiros;<\/li>\n\n\n\n<li>Outras informa\u00e7\u00f5es confidenciais.<\/li>\n<\/ul>\n\n\n\n<p><strong>O termo phishing vem da palavra &#8220;pesca&#8221;. Os atacantes est\u00e3o atraindo as pessoas para armadilhas, da mesma forma que os peixes s\u00e3o capturados com iscas.<\/strong><\/p>\n\n\n\n<p>O uso de &#8220;ph&#8221; em vez de &#8220;f&#8221; provavelmente se originou da cultura hacker, em que grafias alternativas eram comuns.<\/p>\n\n\n\n<p>Os ataques de phishing geralmente parecem vir de fontes confi\u00e1veis, como bancos ou servi\u00e7os on-line populares, mas na verdade s\u00e3o criados por criminosos cibern\u00e9ticos para roubar informa\u00e7\u00f5es. Os ataques de phishing dependem da cria\u00e7\u00e3o de um senso de urg\u00eancia ou p\u00e2nico para manipular as v\u00edtimas a clicar em links duvidosos ou compartilhar dados confidenciais.<\/p>\n\n\n\n<p><strong>Temos um <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">guia completo sobre como identificar ataques de phishing por e-mail<\/a>, mas aqui est\u00e1 o que voc\u00ea deve saber:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Um invasor envia uma grande quantidade de e-mails para pessoas aleat\u00f3rias. Essas mensagens s\u00e3o todas id\u00eanticas e cont\u00eam um link que aponta para <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-email-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">um site falso<\/a> para induzir o leitor a deixar suas credenciais; <br><\/li>\n\n\n\n<li>Os ataques de phishing geralmente incluem amea\u00e7as de que a conta da v\u00edtima ser\u00e1 fechada se ela n\u00e3o tomar provid\u00eancias. Os hackers tamb\u00e9m podem dizer a v\u00edtima que sua seguran\u00e7a foi comprometida de alguma forma; <br><\/li>\n\n\n\n<li>Caso voc\u00ea receba uma mensagem de uma organiza\u00e7\u00e3o confi\u00e1vel, verifique novamente o endere\u00e7o de e-mail do remetente. O invasor pode estar usando uma varia\u00e7\u00e3o muito sutil com base no endere\u00e7o de e-mail leg\u00edtimo da organiza\u00e7\u00e3o. <\/li>\n<\/ul>\n\n\n\n<p>Os esquemas modernos de phishing <a href=\"https:\/\/supertokens.com\/blog\/phishing-attacks-in-2024\" target=\"_blank\" rel=\"noreferrer noopener\">est\u00e3o cada vez mais sofisticados<\/a>, imitando a apar\u00eancia de comunica\u00e7\u00f5es leg\u00edtimas em um grau perturbador. \u00c9 por isso que \u00e9 fundamental verificar duas vezes todos os links antes de voc\u00ea clicar neles (mas falaremos mais sobre isso depois).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-principais-diferencas-entre-spam-e-phishing\">Principais diferen\u00e7as entre spam e phishing<\/h2>\n\n\n\n<p>Embora o spam e o phishing possam parecer semelhantes, eles s\u00e3o diferentes em v\u00e1rios aspectos importantes.<\/p>\n\n\n\n<p><strong>Em termos de objetivos, os e-mails de spam s\u00e3o criados para fins de publicidade. Em geral, eles n\u00e3o s\u00e3o sofisticados e tentam atingir o maior n\u00famero poss\u00edvel de pessoas sem um direcionamento espec\u00edfico. <\/strong><\/p>\n\n\n\n<p>Por outro lado, o phishing \u00e9 uma forma de ataque muito mais direcionada e maliciosa. A <a href=\"https:\/\/www.twingate.com\/blog\/tips\/ledger-data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">famosa viola\u00e7\u00e3o de dados do Ledger<\/a>, por exemplo, exp\u00f4s os endere\u00e7os de e-mail de milhares de detentores de criptomoedas. Essas pessoas foram ent\u00e3o alvo de v\u00e1rios ataques de phishing focados na criptomoeda. Aqui est\u00e1 um exemplo:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"845\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1.png\" alt=\"Exemplo de um ataque de phishing de criptomoeda\" class=\"wp-image-90585\" style=\"width:669px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1.png 992w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1-300x256.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1-768x654.png 768w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><figcaption class=\"wp-element-caption\"><em>Exemplo de um ataque de phishing de criptomoeda<\/em><\/figcaption><\/figure>\n\n\n\n<p>Como voc\u00ea pode ver, esse tipo de ataque pode ser muito refinado em termos de layout e de quem ele atinge. Os ataques de phishing geralmente imitam comunica\u00e7\u00f5es leg\u00edtimas, copiando a marca e o estilo de comunica\u00e7\u00e3o de um remetente confi\u00e1vel.<\/p>\n\n\n\n<p>Em alguns casos, os ataques de phishing podem ser hiperdirecionados a um indiv\u00edduo espec\u00edfico. Nesse caso, eles s\u00e3o chamados de <a href=\"https:\/\/blog.mailfence.com\/distinguish-spear-phishing-from-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>spear phishing<\/em><\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-combate-ao-spam-e-ao-phishing\">Combate ao spam e ao phishing<\/h2>\n\n\n\n<p>A maneira como voc\u00ea lida com spam e ataques de phishing \u00e9 bem diferente. Veja a seguir o que voc\u00ea pode fazer em ambos os casos. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-para-se-proteger-contra-spam-ative-os-filtros-de-spam-em-seu-servico-de-e-mail\"><strong>Para se proteger contra spam, ative os filtros de spam em seu servi\u00e7o de e-mail.<\/strong><\/h3>\n\n\n\n<p>Essa \u00e9 a maneira mais eficaz de filtrar e-mails indesejados. No Mailfence, <a href=\"https:\/\/kb.mailfence.com\/categories\/abuse-and-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">nossos fortes filtros antispam<\/a> s\u00e3o ativados por padr\u00e3o quando voc\u00ea cria sua conta. Se voc\u00ea perceber que um e-mail de spam chegou \u00e0 sua caixa de entrada, poder\u00e1 marc\u00e1-lo como spam <strong>clicando com o bot\u00e3o direito do mouse sobre ele<\/strong> &gt; <strong>Mark<\/strong> &gt; <strong>Spam<\/strong>. Em alguns casos, nosso filtro antispam pode sinalizar algo que n\u00e3o seja realmente spam e, nesse caso, voc\u00ea precisar\u00e1 colocar <a href=\"https:\/\/blog.mailfence.com\/pt\/lista-de-permissoes\/\" target=\"_blank\" rel=\"noreferrer noopener\">o remetente na lista de permiss\u00f5es<\/a>.   <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-quando-se-trata-de-phishing-sempre-verifique-o-endereco-de-e-mail-do-remetente\"><strong>Quando se trata de phishing, sempre verifique o endere\u00e7o de e-mail do remetente.<\/strong><\/h3>\n\n\n\n<p>Se houver algum senso de amea\u00e7a ou urg\u00eancia no e-mail, presuma que se trata de um ataque de phishing. Os e-mails de phishing geralmente usam endere\u00e7os muito parecidos com os leg\u00edtimos, com apenas pequenas varia\u00e7\u00f5es. Se n\u00e3o tiver certeza, cruze o endere\u00e7o com um e-mail que voc\u00ea tenha certeza de que \u00e9 leg\u00edtimo.  <\/p>\n\n\n\n<p>Se voc\u00ea ainda n\u00e3o tiver certeza, entre em contato com o atendimento ao cliente por meio do formul\u00e1rio de contato oficial, do endere\u00e7o de e-mail de suporte ou do n\u00famero de telefone. Em qualquer caso, voc\u00ea NUNCA deve clicar em um link ou bot\u00e3o sem ter 100% de certeza de que o remetente \u00e9 leg\u00edtimo. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"1024\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-779x1024.png\" alt=\"\" class=\"wp-image-90590\" style=\"width:641px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-779x1024.png 779w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-228x300.png 228w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-768x1009.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2.png 800w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><figcaption class=\"wp-element-caption\"><em>Exemplo de um ataque de phishing que se faz passar por Ledger<\/em><\/figcaption><\/figure>\n\n\n\n<p>No exemplo acima, o e-mail est\u00e1 vindo do dom\u00ednio &#8220;ledgersupport.io&#8221;, um <a href=\"https:\/\/serhack.me\/articles\/practical-analysis-ledger-phishing-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">dom\u00ednio criado apenas um dia antes<\/a> e n\u00e3o vinculado de forma alguma \u00e0 Ledger.<\/p>\n\n\n\n<p>Al\u00e9m disso, <a href=\"https:\/\/blog.mailfence.com\/pt\/otp-one-time-password\/\" target=\"_blank\" rel=\"noreferrer noopener\">o uso da autentica\u00e7\u00e3o de dois fatores<\/a> em suas contas acrescenta uma camada extra de seguran\u00e7a. Caso os invasores tenham acesso \u00e0s suas credenciais de login, eles ainda n\u00e3o poder\u00e3o entrar na sua conta. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-isso-e-tudo-neste-guia-sobre-spam-vs-phishing\">Isso \u00e9 tudo neste guia sobre Spam vs. Phishing!<\/h2>\n\n\n\n<p>Com isso, encerramos este guia sobre spam e phishing! Embora tanto o spam quanto o phishing sejam formas de comunica\u00e7\u00e3o indesejada, eles diferem muito em termos de inten\u00e7\u00e3o e impacto. Esperamos que este guia tenha ajudado voc\u00ea a entender a diferen\u00e7a entre os dois e evite que voc\u00ea se torne uma v\u00edtima no futuro!<\/p>\n\n\n\n<p>A seguran\u00e7a on-line come\u00e7a com um e-mail privado e seguro. Aqui no Mailfence, n\u00f3s nos orgulhamos de ser um dos e-mails mais privados e seguros. Al\u00e9m disso, sua conta gratuita tamb\u00e9m vem com <a href=\"https:\/\/blog.mailfence.com\/pt\/mailfence-documents-compartilhamento-seguro-arquivos-armazenamento-colaboracao\/\" target=\"_blank\" rel=\"noreferrer noopener\">armazenamento on-line para seus documentos mais importantes<\/a>, um <a href=\"https:\/\/blog.mailfence.com\/pt\/mailfence-calendar-calendario-on-line-seguro\/\" target=\"_blank\" rel=\"noreferrer noopener\">calend\u00e1rio<\/a>, <a href=\"https:\/\/blog.mailfence.com\/pt\/mailfence-contacts-a-secure-contact-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">gerenciamento de contatos<\/a> e muito mais:  <\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<p>Voc\u00ea tem alguma d\u00favida? Voc\u00ea pode <a href=\"https:\/\/kb.mailfence.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">consultar nossa Base de Conhecimento<\/a> ou entrar em contato conosco pelo e-mail support@mailfence.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Todos os dias, uma nova viola\u00e7\u00e3o ou vazamento de dados vem a p\u00fablico. Isso significa que, infelizmente, a maioria dos nossos endere\u00e7os de e-mail agora est\u00e1 dispon\u00edvel gratuitamente na dark net, o que os torna um alvo f\u00e1cil para tentativas de spam e phishing. Neste guia, abordaremos tudo [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":90783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1379],"tags":[],"class_list":["post-91519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog<\/title>\n<meta name=\"description\" content=\"Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Neste guia, abordaremos tudo o que voc\u00ea precisa saber sobre essas amea\u00e7as comuns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T14:01:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Haven\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mailfence\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Haven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\"},\"author\":{\"name\":\"Simon Haven\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f\"},\"headline\":\"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a?\",\"datePublished\":\"2024-10-07T09:00:00+00:00\",\"dateModified\":\"2025-09-16T14:01:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\"},\"wordCount\":1459,\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\",\"articleSection\":[\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\",\"name\":\"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\",\"datePublished\":\"2024-10-07T09:00:00+00:00\",\"dateModified\":\"2025-09-16T14:01:12+00:00\",\"description\":\"Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Neste guia, abordaremos tudo o que voc\u00ea precisa saber sobre essas amea\u00e7as comuns.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\",\"width\":600,\"height\":600,\"caption\":\"spam vs phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\/\/blog.mailfence.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#website\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/mailfence\/\",\"https:\/\/x.com\/mailfence\",\"https:\/\/www.reddit.com\/r\/Mailfence\/\",\"https:\/\/www.linkedin.com\/company\/mailfence\",\"https:\/\/www.instagram.com\/mailfence_\/\",\"https:\/\/www.youtube.com\/@mailfence\",\"https:\/\/en.wikipedia.org\/wiki\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f\",\"name\":\"Simon Haven\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"caption\":\"Simon Haven\"},\"description\":\"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/author\/simon\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog","description":"Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Neste guia, abordaremos tudo o que voc\u00ea precisa saber sobre essas amea\u00e7as comuns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/","og_locale":"pt_BR","og_type":"article","og_title":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog","og_description":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2024-10-07T09:00:00+00:00","article_modified_time":"2025-09-16T14:01:12+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","type":"image\/jpeg"}],"author":"Simon Haven","twitter_card":"summary_large_image","twitter_creator":"@mailfence","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Simon Haven","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/"},"author":{"name":"Simon Haven","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f"},"headline":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a?","datePublished":"2024-10-07T09:00:00+00:00","dateModified":"2025-09-16T14:01:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/"},"wordCount":1459,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","articleSection":["Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/","url":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/","name":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a? | Mailfence Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","datePublished":"2024-10-07T09:00:00+00:00","dateModified":"2025-09-16T14:01:12+00:00","description":"Spam vs. phishing: voc\u00ea sabe a diferen\u00e7a? Neste guia, abordaremos tudo o que voc\u00ea precisa saber sobre essas amea\u00e7as comuns.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","width":600,"height":600,"caption":"spam vs phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"Spam vs. Phishing: qual \u00e9 a diferen\u00e7a?"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f","name":"Simon Haven","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","caption":"Simon Haven"},"description":"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.","url":"https:\/\/blog.mailfence.com\/pt\/author\/simon\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/91519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=91519"}],"version-history":[{"count":10,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/91519\/revisions"}],"predecessor-version":[{"id":103118,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/91519\/revisions\/103118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/90783"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=91519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=91519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=91519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}