Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. These crooks are hoping people that have an account with the business will click on the link and submit their account information for verification purposes. These thieves are phishing for account information. Phishing is a sophisticated way to lure you to phony websites where you voluntarily surrender your passwords and account information to identity thieves without realizing it.

These types of emails often threaten you. You must take action within a limited time or the consequences will be dire. Some AOL customers received a phishing email stating if they did not verify their account information within 24 hours, their service would be terminated. Other phishing emails will state your account has been flagged or has a problem and the account information needs to be verified. We received an email for Pay Pal that stated our account had been flagged and we needed to verify our account information. The identity thieve was lucky. We do have an account with Pay Pal. We open the email and it appeared to be an email from Pay Pal. We click on the link and it took us to https://www.paypal.ae.com. The site looked Pay Pal's website. The web page was asking for our account information for verification purposes. We knew right away it was a phony because our Pay Pal account was opened with another email address. This particular site has been shut down, but doesn't mean the identity thieve was caught. You could receive a phishing email from the same thieve tomorrow. What can you do to avoid such a trap?

First, realize reputable companies will never send you an email asking you to confirm your account information. The email will look authentic and this may cause you some concern. If this is the case, you can always call the company and ask about your account. An alternative to calling is checking your account online. Do not click on the link in the email. Log completely out of your email and open another window and type in the company's web address to verify your account.

You're probably thinking why would you want go to the trouble to close your email and open another browser window. The link in the email is a cloaked redirection link that will take you to another website that is not associated with the company. A cloak link will show you the correct web address when you move your mouse over it. If you do click on that link, the web address, or URL, will be similar to the company's address, but it will not match exactly. The website will look just like just like you expect it too look. The web page will ask for your account information. You're just one click away from submitting your account information to the identity thieve. We went to the actual Pay Pal website and, sure enough, our account was ok.

Identity thieve have been known to attach a file to a phishing email. The attachment contain a program to transmit your personal information on your hard drive to the identity thieve. You will never know the program has been installed on your computer. Never open an email attachment unless you specifically requested it and are expecting an email with an attachment. The phishing email may be from someone you know. His or her computer could be infected with a virus that sends email to everyone in his or her address book. Delete the emails with attachments without opening the email.

Finally, if you get an email that is phishing for your information, forward it to spam@uce.gov. If you know how open the email headers, cut and past that information into the email to help the FCC track down these identity thieves.

George Burks of http://www.mybiweeklymortgagepayment.com has offered a biweekly mortgage payment plan with no enrollment fees since 1999. His interest in financial topics is varied and includes identity protection. Please visit our financial library.

In The News:


pen paper and inkwell


cat break through


Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More