The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."
What is Phishing?
Phishing is a scam initiated via e-mail. Messages are "fishing" for personal and financial information. Most often, e-mails appear to be from reputable companies (internet service providers, telephone companies, etc), banks, and other financial organizations. The e-mail message often gives a story of the bank needing to update its personal information database or a financial institution claiming your personal data had been lost.
Who Phishes?
Hackers and Scammers looking for personal and financial information use phishing as an effective method of gathering information. Phishers imitate legitimate companies in e-mails to entice people to share passwords or credit-card numbers. Recent victims include:
? Bank of America
? Best Buy
? America Online
? eBay
? PayPal
? Washington Mutual
? MSN (Microsoft Network)
History of Phishing
The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the Web page code from a major site - such as AOL - and use that code to set up a replica page that appears to be part of the company's site. (This is why phishing is also called spoofing.) A fake e-mail is sent out with a link to this page, which solicits the user's credit card data or password. When the form is submitted, it sends the data to the scammer while leaving the user on the company's site so they don't suspect a thing.
Avoid Phishing
Fortunately, common sense can save you from giving away your personal information. For example, be aware for the company requesting information. I have received e-mails from banks I have never had business with. Know that your bank or ISP will never ask for your information out of the blue. Banks do not update their databases and misplace information.
Tips To Avoid Phishing
? If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body.
? Look for words misspelled or other grammatical mistakes.
? Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
? If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine.
? If you unknowingly supplied personal or financial information, contact your bank and credit card company immediately.
? Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov.
S. Nestor writes for StormFront Development Group, a pioneer in Internet Marketing. Contact him at snestor@stormfrontdevelopment.com
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Computer infections can be broken up into 4 main categories... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
This is not some new fangled techno-speak, it is a... Read More
A friend called me one day and asked if I... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
When surfing the Internet you probably take your anonymity for... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
There are ways to insure security though. You can get... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
In the past I've never really paid much attention to... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Pharming is one of the latest online scams and rapidly... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Watching how the traditional media covers the latest virus or... Read More
Millions of people make purchases online, but many people are... Read More
At this point, if you've got the whole "turning the... Read More
There are folks out there who use their powers for... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
I am the victim of an internet scam. It is... Read More
The Internet is a vast International Network of people and... Read More
Ok, you've got a computer, and you get online. You... Read More
I got a virus the other day, Thursday I believe... Read More
Can you protect your computer from all possible viruses and... Read More
The trash folder in my main inbox hit 4000 today.... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
If you have used a Windows machine for a while,... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
The words Corporate Security may conjure up images of a... Read More
The average computer is packed with hidden software that can... Read More
The top five online scams on the Internet hit nearly... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
When it comes to a secure website and passwords it... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
This is the second in a series of articles highlighting... Read More
There are several basic concepts to keep in mind when... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
It has been said that with the wealth of information,... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
A little bit of time invested into learning about internet... Read More
We all know that it's dangerous to use the same... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Be careful of sites that promise to send you "instant... Read More
At this point, if you've got the whole "turning the... Read More
A few nights ago I received an email from "2CO"... Read More
Well, if that would have been said to me by... Read More
There are ways to insure security though. You can get... Read More
Sooner or later everyone with an email account will receive... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Today the internet is a mine field of malicious code... Read More
Security leaks can be a big problem for any site... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Someone recently told me, "You would have to be a... Read More
Internet Security |