Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.
To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. The issue, though, is the pretence of such mail.
You may not even have such an account as referenced.
It doesn't come from the account provider.
It can use false S.S.L. references, to present an illusion of trust and security.
It can prompt for immediate action on your part, alleging false log-in's by persons unknown, and from countries unknown. If action is not taken, they can impress on you, that the account will be suspended or closed. Indeed, anything likely to work can be fabricated, to get you to the webpage suggested in the link or hyperlink. Note the word "suggested". Likenesses to company logos are used to re-enforce "credibility".
In fact, these phishing attempts actually look pretty good or realistic. So much so that any qualms of guilt or stupidity, experienced by a "conned party" are groundless.
Experience, specific education or forewarning, is all that prevents this type of charade from widening its base of "victims".
The goal is to get you to type in your details, complete with credit card number and the rest can be guessed.
Some damage is also absorbed by the organisation or company being misrepresented and they can do little about it but warn their customers what to watch out for, and issue security instructions. Indeed, it is from accounts at reputable companies that most passing trade learn the correct or most secure procedures. It is therefore important to read any material that they offer.
Generally though, reputable companies with a mind to preserve their integrity will tell you to log-in at their main page and proceed from there. Not through a link specific to your account!
Hyperlinks can mask the true domain that you'll be brought to, with the text linked to www.anydomaindotcom (example, only), a replica or fake page. Only going to secure pages where one believes that "https" will do it, will always help but wholly unreliable. The "s" is an indication of a secure page, but are you at the right domain?
Place your mouse over the link and the domain attached to such a link, should show itself. Viewing the source code is another way but some knowledge of it is necessary.
Another ploy, sometimes deliberate and sometimes "convenient", is inserting a reference to the "legitimate company" anywhere after the domain name. Ex. https://www.anydomaindotcom/ebay/aagle/. Unwary victims may overlook the fact that "ebay" is not the domain, but see it anyway as a directory or file name. Anyone, anywhere can have a file or directory named like that of a company.
To make matters somewhat worse from an "easy to identify" viewpoint, the source code of the link can be represented as an I.P. address rather than its named counterpart. There are some tools that you can use at http://centralops.net/co/ which you can use to type in the I.P. address and cross reference it with the official account domain presented in the e-mail, or web page for that matter. Opening a second window for investigative purposes and re-sizing both to be side by side can be revealing, and comparisons be made between the alleged source and that of the source code.
www.ebay.com can be put in one window and www.suspiciouslyspurious.com can be put in the other. NOTE; you should be checking domains and ignoring everything that comes after the forward slash at the end of the domain. A similar test can be done for email viruses, where suspicious email addresses can be searched for some degree of authenticity.
If you are phished, try to learn as much as possible about it as phishing attempts and email viruses have some aspects in common. Incorrect spelling is one of them. You must understand that the authors can be from anywhere and not necessarily have degrees in English. Legitimate companies can also be from anywhere, with different primary languages, but do perfect their spellings and general grammar.
Attention to upper and lower case can be another giveaway. This is especially true where particular portions of the text are the design of the author, and not just copied and pasted. Typically, these portions are customised to be customer specific in a general sense, and fonts may even be different or out of place. Such "special" additions are to strengthen the sense of urgency and call to action.
Should you be the recipient of "phishy mail", you can forward it to spam@uce.gov
Seamus Dolly and phising samples are at http://www.CountControl.com/phishy.html
Spyware/adware is a new major concern for PC users everywhere.... Read More
When it comes to reporting Internet scams most of us... Read More
Credit card fraud is a growing problem for online businesses... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
This really chapped my lips...I recently bought a new computer.... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Despite the current wave of identity theft and corporate security... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Since its birth, the Internet has grown and expanded to... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Identity Theft is one of the most serious problems facing... Read More
P C. owners are constantly at risk from attacks by... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Is your data secure? Think again. Securing data is unlike... Read More
If you constantly deal with bank or electronic accounts, it... Read More
If you have used a Windows machine for a while,... Read More
Can you protect your computer from all possible viruses and... Read More
Huge number of spyware software applications are available in the... Read More
This is the second in a series of articles highlighting... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
You'd better learn news from media, not from emails, security... Read More
There you are busily typing away on your PC or... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Identity theft is one of the most common criminal acts... Read More
Every day millions of people go online to find information,... Read More
Much has been said on the theory of password protection... Read More
Phishing is the act of some individual sending an email... Read More
Let us take the example of scrambling an egg. First,... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Have been an Internet user for more than 9 years,... Read More
Imagine my surprise when I received a phone call from... Read More
To blog or not to blog? Well, why not? Lots... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Watching how the traditional media covers the latest virus or... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Nobody wants to pay to remove spyware. At the very... Read More
History and BackgroundThe virus was one of the first ever... Read More
As you know, this time the virus under the name... Read More
They're out there. Individuals trying to make a quick buck... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Before we start, I want to make it clear that... Read More
Spyware protection software is the easiest way of removing spyware... Read More
You can detect spyware online using free spyware cleaners and... Read More
With the advent of the World Wide Web, a whole... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
First the basic definition of Spyware: It is a type... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Someone recently told me, "You would have to be a... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
The first thing people think about when defending their computers... Read More
Every single time you access a website, you leave tracks.... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Internet Security |