Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity.
The Anti-Phishing Working Group estimates that 75 million to 150 million phishing emails are sent every day on the internet. Phishing (pronounced fishing), is online identity theft that uses spoof emails, fraudulent websites and crimeware to trick unsuspecting internet users into providing financial data, credit card numbers, social security numbers, account logins and passwords, etc.
A spoofed email looks like it is from a legitimate company, usually banks, credit card companies, paypal, ebay, etc. These fraudulent emails look like they are from the "real" company, and generally try to get you to log into your account through the links in the email. The spoof email may state that there is a problem with your account and if you do not log in and update your information your account may be suspended, restricted, closed, etc. Generally these emails try to convey a sense of urgency; if you don't correct this problem your account will be suspended.
Trojans are increasingly being used as a phishing technique according to Sophos, a security firm. The Brizilian police recently arrested a phishing gang of 18 people who stole $37M from online banking accounts. This phishing gang would send out emails that included Trojans. Once a Trojan infects your computer, all internet activity can be monitored and transferred to the phisher. This is a serious threat as you probably won't know that you are infected with a Trojan.
According to David Jevans, Chairman of APWG, "Attacks can, and are, coming in a variety of other flavors. Instant Messaging, exploited websites, P2P networks, and search engines are all being used to download and run key logging malcode and/or be directed to websites which may contain malcode or be fraudulent. Attackers are also not just interested in username and password access to bank accounts. Social security numbers, credit cards and other identity information are also being stolen."
Protecting yourself against phishing scams.
? Do not give out personal or financial information through an email request.
? Always log on to your sensitive accounts by opening a new browser and typing the actual URL directly into the address bar. For example, if you receive a suspected phishing email from ebay, open a new browser and type www.ebay.com in the browser bar.
? Do not click on any link in a suspected phishing email.
? Only use a secure website to submit sensitive data. A secure sites' address will begin with "https://" instead of "http://"
? Check the activity of your online accounts regularly.
? Make sure your browser is up to date and all security patches are installed.
? Report phishing and spoof email to: reportphishing@antiphishing.com , spam@uce.gov, and forward the email to the company that is being spoofed.
? Keep your pc protected with updated anti-virus software, anti-spyware software, and a firewall.
? You may also want to install anti-phishing software.
o Earthlink ScamBlocker is a free browser toolbar that alerts you to known phishing sites. It's free and can be downloaded at www.earthlink.net/earthlinktoolbar.
o Webroot has a beta version of PhishNet which you can download at www.webroot.com/products/phishnet/
o PC Tools Spyware Doctor offers protection against known phishing sites, spyware and blocks popups.
With the consequences being identity theft, it is imperative that you learn to protect your pc and your identity by exercising caution and installing the proper tools. Hopefully, this identity theft article has given you the information you need to avoid being the next phishing victim. Remember, legitimate companies don't ask for personal or financial information in an email ? so don't give it to them!
Lisa Smith is the webmaster of 1stSpywareRemoval.com This website offers information on spyware, adware, internet safety, indepth reviews, and news.
What is a Firewall?The term "firewall" illustrates a system that... Read More
Spyware is software that runs on a personal computer without... Read More
The Message Must Get Through The year is 300A.D.,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Working from home has its advantages, including no commute, a... Read More
If you are a parent, as am I, I think... Read More
Have been an Internet user for more than 9 years,... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
While clicking from site to site on the internet you... Read More
Can you protect your computer from all possible viruses and... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Many of us have run into an annoying and time-consuming... Read More
Ebay is a great site and is used by many... Read More
When the Internet first came about, it was realized it... Read More
We all know that it's dangerous to use the same... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
A little bit of time invested into learning about internet... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Having a good Spyware eliminator on your computer is vital... Read More
First of all we need to get some terms stated.... Read More
It's late. You've been scouring the web for that perfect... Read More
Do you really have to know how feeds work? Not... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
My first experience with a spyware BHO based infection was... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Computer security for most can be described in 2 words,... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Today the internet is a mine field of malicious code... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Today,on most internet user's computers, we have the ability to... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
A couple of years back, I paid my dues the... Read More
Well, this is an article I never thought I would... Read More
First of all we need to get some terms stated.... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
These six ways to prevent identity theft offer you valuable... Read More
If you constantly deal with bank or electronic accounts, it... Read More
The Internet is a vast International Network of people and... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
They're out there. Individuals trying to make a quick buck... Read More
No longer are viruses the only threat on the internet.... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The words Corporate Security may conjure up images of a... Read More
There is nothing more important that password security in world... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
There is no doubt that "how-to articles" have become a... Read More
If spyware were a person and he set himself up... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
There are ways to insure security though. You can get... Read More
Nowadays more and more people are using a computer. A... Read More
As the number of people using the Internet as an... Read More
History and BackgroundThe virus was one of the first ever... Read More
There are several basic concepts to keep in mind when... Read More
Every single time you access a website, you leave tracks.... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
When surfing the Internet you probably take your anonymity for... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
The top five online scams on the Internet hit nearly... Read More
We all know that it's dangerous to use the same... Read More
Computer infections can be broken up into 4 main categories... Read More
Internet Security |