"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.
But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse.
"Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more.
Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet.
Here's the basic pattern for a "phishing" scam...
You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity.
In the email it tells you that something bad is about to happen unless you act quickly.
Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name.
In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up.
Once you give up your information... it's all over but the crying!
After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse.
An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers.
In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal.
They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it.
Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account.
This new "phishing" style scam works extremely well for 2 basic reasons.
First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking.
Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional frenzy.
The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense.
Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox.
If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think!
Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling.
Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it.
Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com).
Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate.
Above all remember this:
Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information.
They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details.
About The Author
Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.TurnWordsIntoTraffic.com
Is your enterprise following the rules?The bulk of financial information... Read More
If you are wondering how to fight spyware for safe... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
When it comes to reporting Internet scams most of us... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Imagine my surprise when I received a phone call from... Read More
Well, this is an article I never thought I would... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
The average computer is packed with hidden software that can... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Computer infections can be broken up into 4 main categories... Read More
Computer security for most can be described in 2 words,... Read More
Working from home has its advantages, including no commute, a... Read More
Spyware is software that runs on a personal computer without... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
As more people are logging onto the Internet everyday, Network... Read More
You can detect spyware online using free spyware cleaners and... Read More
There has not been a time in the history of... Read More
Ok, you've got a computer, and you get online. You... Read More
Do you sometimes notice your computer running slower. Is your... Read More
A friend called me one day and asked if I... Read More
Did you know...? 1 in 5 children who use computer... Read More
A new variation of the Nigerian Scam theme ... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Phishing is the act of some individual sending an email... Read More
Before you enter your name, address or any other data... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
By browsing a web page, you could infect your computer... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Imagine my surprise when I received a phone call from... Read More
Security leaks can be a big problem for any site... Read More
Have been an Internet user for more than 9 years,... Read More
Huge number of spyware software applications are available in the... Read More
Every day millions of people go online to find information,... Read More
Can you protect your computer from all possible viruses and... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
You may not realize it, but as you are surfing... Read More
Spyware protection software is the easiest way of removing spyware... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Credit card fraud is a growing problem for online businesses... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Computer infections can be broken up into 4 main categories... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
During the release of a new software product specialized to... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Business on the internet is getting down right shameless. This... Read More
Despite the current wave of identity theft and corporate security... Read More
The first thing people think about when defending their computers... Read More
Phishing is a relatively new form of online fraud that... Read More
Before we start, I want to make it clear that... Read More
In recent days, I was one of the unfortunate persons... Read More
To blog or not to blog? Well, why not? Lots... Read More
Spyware and adware are becoming major problems for online surfers... Read More
First I would like to stress I am condoning the... Read More
In 1997, I decided after 15 years as a practicing... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Internet Security |