The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."
What is Phishing?
Phishing is a scam initiated via e-mail. Messages are "fishing" for personal and financial information. Most often, e-mails appear to be from reputable companies (internet service providers, telephone companies, etc), banks, and other financial organizations. The e-mail message often gives a story of the bank needing to update its personal information database or a financial institution claiming your personal data had been lost.
Who Phishes?
Hackers and Scammers looking for personal and financial information use phishing as an effective method of gathering information. Phishers imitate legitimate companies in e-mails to entice people to share passwords or credit-card numbers. Recent victims include:
? Bank of America
? Best Buy
? America Online
? eBay
? PayPal
? Washington Mutual
? MSN (Microsoft Network)
History of Phishing
The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the Web page code from a major site - such as AOL - and use that code to set up a replica page that appears to be part of the company's site. (This is why phishing is also called spoofing.) A fake e-mail is sent out with a link to this page, which solicits the user's credit card data or password. When the form is submitted, it sends the data to the scammer while leaving the user on the company's site so they don't suspect a thing.
Avoid Phishing
Fortunately, common sense can save you from giving away your personal information. For example, be aware for the company requesting information. I have received e-mails from banks I have never had business with. Know that your bank or ISP will never ask for your information out of the blue. Banks do not update their databases and misplace information.
Tips To Avoid Phishing
? If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body.
? Look for words misspelled or other grammatical mistakes.
? Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
? If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine.
? If you unknowingly supplied personal or financial information, contact your bank and credit card company immediately.
? Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov.
S. Nestor writes for StormFront Development Group, a pioneer in Internet Marketing. Contact him at snestor@stormfrontdevelopment.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Identity Theft is one of the most serious problems facing... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Fishing on the Internet has come a long way. However,... Read More
Well, if that would have been said to me by... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Imagine my surprise when I received a phone call from... Read More
Have you ever had to call Symantec or McAfee to... Read More
If you know what is the 'Fishing' then it's very... Read More
First off I should explain what phishing is. Phishing is... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Security leaks can be a big problem for any site... Read More
If you are a parent, you have probably wondered at... Read More
Viruses are, however, not the only malicious software programs out... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
First of all we need to get some terms stated.... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
In the past I've never really paid much attention to... Read More
Business on the internet is getting down right shameless. This... Read More
Identity theft rates one of the fastest growing crimes in... Read More
History and BackgroundThe virus was one of the first ever... Read More
You've seen it in the news - 40 million credit... Read More
The money being spent online is steadily growing. With billions... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
When it comes to reporting Internet scams most of us... Read More
Today the internet is a mine field of malicious code... Read More
Only the top spyware removers are successful at detecting and... Read More
Microsoft routinely releases new security updates, many of which are... Read More
My first experience with a spyware BHO based infection was... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
The money being spent online is steadily growing. With billions... Read More
Business on the internet is getting down right shameless. This... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
When it comes to a secure website and passwords it... Read More
If you are a parent, you have probably wondered at... Read More
Be careful of sites that promise to send you "instant... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Phishing is the act of some individual sending an email... Read More
When the Internet first came about, it was realized it... Read More
Credit card fraud is a growing problem for online businesses... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Every day millions of people go online to find information,... Read More
Millions of people make purchases online, but many people are... Read More
You can detect spyware online using free spyware cleaners and... Read More
The 1998 Data Protection Act was not an extension to,... Read More
In recent days, I was one of the unfortunate persons... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
I am the victim of an internet scam. It is... Read More
No longer are viruses the only threat on the internet.... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
As the number of people using the Internet as an... Read More
Today,on most internet user's computers, we have the ability to... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Some months ago, before there was much publicity regarding phishing... Read More
When we think of adware, what comes to mind are... Read More
Only the top spyware removers are successful at detecting and... Read More
Internet Security |