Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity.
The Anti-Phishing Working Group estimates that 75 million to 150 million phishing emails are sent every day on the internet. Phishing (pronounced fishing), is online identity theft that uses spoof emails, fraudulent websites and crimeware to trick unsuspecting internet users into providing financial data, credit card numbers, social security numbers, account logins and passwords, etc.
A spoofed email looks like it is from a legitimate company, usually banks, credit card companies, paypal, ebay, etc. These fraudulent emails look like they are from the "real" company, and generally try to get you to log into your account through the links in the email. The spoof email may state that there is a problem with your account and if you do not log in and update your information your account may be suspended, restricted, closed, etc. Generally these emails try to convey a sense of urgency; if you don't correct this problem your account will be suspended.
Trojans are increasingly being used as a phishing technique according to Sophos, a security firm. The Brizilian police recently arrested a phishing gang of 18 people who stole $37M from online banking accounts. This phishing gang would send out emails that included Trojans. Once a Trojan infects your computer, all internet activity can be monitored and transferred to the phisher. This is a serious threat as you probably won't know that you are infected with a Trojan.
According to David Jevans, Chairman of APWG, "Attacks can, and are, coming in a variety of other flavors. Instant Messaging, exploited websites, P2P networks, and search engines are all being used to download and run key logging malcode and/or be directed to websites which may contain malcode or be fraudulent. Attackers are also not just interested in username and password access to bank accounts. Social security numbers, credit cards and other identity information are also being stolen."
Protecting yourself against phishing scams.
? Do not give out personal or financial information through an email request.
? Always log on to your sensitive accounts by opening a new browser and typing the actual URL directly into the address bar. For example, if you receive a suspected phishing email from ebay, open a new browser and type www.ebay.com in the browser bar.
? Do not click on any link in a suspected phishing email.
? Only use a secure website to submit sensitive data. A secure sites' address will begin with "https://" instead of "http://"
? Check the activity of your online accounts regularly.
? Make sure your browser is up to date and all security patches are installed.
? Report phishing and spoof email to: reportphishing@antiphishing.com , spam@uce.gov, and forward the email to the company that is being spoofed.
? Keep your pc protected with updated anti-virus software, anti-spyware software, and a firewall.
? You may also want to install anti-phishing software.
o Earthlink ScamBlocker is a free browser toolbar that alerts you to known phishing sites. It's free and can be downloaded at www.earthlink.net/earthlinktoolbar.
o Webroot has a beta version of PhishNet which you can download at www.webroot.com/products/phishnet/
o PC Tools Spyware Doctor offers protection against known phishing sites, spyware and blocks popups.
With the consequences being identity theft, it is imperative that you learn to protect your pc and your identity by exercising caution and installing the proper tools. Hopefully, this identity theft article has given you the information you need to avoid being the next phishing victim. Remember, legitimate companies don't ask for personal or financial information in an email ? so don't give it to them!
Lisa Smith is the webmaster of 1stSpywareRemoval.com This website offers information on spyware, adware, internet safety, indepth reviews, and news.
![]() |
|
![]() |
|
![]() |
|
![]() |
Spyware is the most troublesome software to appear on the... Read More
First of all we need to get some terms stated.... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Imagine this ? you open up your email box and... Read More
Ebay is a great site and is used by many... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Have you ever had to call Symantec or McAfee to... Read More
In the past I've never really paid much attention to... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
A friend called me one day and asked if I... Read More
The average computer is packed with hidden software that can... Read More
Recently I have received email from my bank/credit Card Company,... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Today the internet is a mine field of malicious code... Read More
Have you ever got an email asking you to confirm... Read More
If you are wondering how to fight spyware for safe... Read More
I got a virus the other day, Thursday I believe... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
If spyware were a person and he set himself up... Read More
If you are a parent, you have probably wondered at... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Before we start, I want to make it clear that... Read More
If you use the internet, you have probably been infected... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Imagine this ? you open up your email box and... Read More
This is the second in a series of articles highlighting... Read More
You and I are a lot alike. We are both... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Spyware is software that runs on a personal computer without... Read More
There are folks out there who use their powers for... Read More
Working from home has its advantages, including no commute, a... Read More
To blog or not to blog? Well, why not? Lots... Read More
The trash folder in my main inbox hit 4000 today.... Read More
If you have used a Windows machine for a while,... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Can you protect your computer from all possible viruses and... Read More
I am the victim of an internet scam. It is... Read More
History and BackgroundThe virus was one of the first ever... Read More
We all know that it's dangerous to use the same... Read More
The Threat10 years ago you could probably have run no... Read More
Paypal is a great site and is used by many... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Today the internet is a mine field of malicious code... Read More
If you use emails actively in your communication, you must... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
With the Internet entering our lives in such an explosive... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Well, this is an article I never thought I would... Read More
Ok, ok, I know you've seen them. All those pop... Read More
When it comes to reporting Internet scams most of us... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
My first experience with a spyware BHO based infection was... Read More
Internet Security |