What is Phishing?
Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of social engineering, by posing as a different person or organization that you already trust.
How does Phishing Work?
The most common form of Phishing is done by sending out fraudulent e-mails, that lead back to websites that look legitimate. Normally an e-mail is sent to a huge amount of people stating in very general terms that you should come to their website and update your information, or provide them with some new information they need, or some other similar excuse. When you click on the link in the e-mail it will take you to a website that looks very similar to the one you are expecting, you enter your information, and now they've got you. Another method is to open a popup windows asking information, on top of the real legitimate website.
How can I identify a scam e-mail?
There are several major things to look out for that will lead you to believe the e-mail is fraudulent. Quite often the e-mails will be HTML based, not plain text, this allows them to put active links that display a legitimate website, but the coding behind it takes you to a different website.
Often new websites are registered with altered spellings of major corporations and organizations, or the link will lead directly to an IP address (ie 24.38.122.156) instead of a website domain (ie www.website.com).
Another very quick way to identify a false e-mail is to see who it is address to. Normally e-mails that are fraudulent in nature are addressed to "Dear Customer" as opposed to your real name, and often they are e-mailed to many users at one time.
No legitimate organization should ever ask you to provide you with personal information via e-mail. If any e-mail ever asks you to e-mail them your private information, you should report this e-mail to the company they are posing as.
How can I avoid falling for a Phishing scam?
If you believe the e-mail could be legitimate, don't click on the link in the e-mail, instead open up your web browser, and use the link/favorite you already have, or type in the website yourself in to the URL box. This will guarantee that you are using the correct legitimate website!
Using the same method to get to the website as mentioned above, go to the organizations help page or contact page and ask them about the e-mail they may have sent you. You can also forward them the e-mail to a known legitimate e-mail address at their organization.
What if I already fell for this scam?
If you have mistakenly been taken in by this kind of scam there is several very important steps you need to take. First, report that you have been tricked by this method to your credit card companies, and other financial institutions.
Report that you have been tricked to the company that you thought you were legitimately updating information for. If you can provide them with the e-mail that tricked you, it may be useful for helping to reduce the impact on other people around the world.
Change all your passwords and PIN numbers for all your financial institutions and websites immediately.
Monitor your credit card statements, financial slips and balances. If you notice a discrepancy, immediately contact your financial organization and let them know about the fraudulent activity. In addition most banks should be able to add you to a fraud report list that will stay on your credit report that will make it harder for people to create new credit cards or open accounts without providing legitimate identification in person. Finally, you should contact your local police or law enforcement organization and file an incident report to cover yourself should illegal activities happen!
Ken Dennis http://KenDennis-RSS.homeip.net/
With the Internet entering our lives in such an explosive... Read More
Shopping for horse gifts or other gift items on the... Read More
Nowadays more and more people are using a computer. A... Read More
If you have used a Windows machine for a while,... Read More
Despite the current wave of identity theft and corporate security... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
You are at your computer, checking out software on EBay.... Read More
The words Corporate Security may conjure up images of a... Read More
File sharing on p2p is soaring despite the music and... Read More
If you use the internet, you have probably been infected... Read More
A couple of years back, I paid my dues the... Read More
This is not some new fangled techno-speak, it is a... Read More
Since its birth, the Internet has grown and expanded to... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Phishing is a relatively new form of online fraud that... Read More
These six ways to prevent identity theft offer you valuable... Read More
Identity Theft is one of the most serious problems facing... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
When it comes to reporting Internet scams most of us... Read More
If you are a parent, you have probably wondered at... Read More
Fishing on the Internet has come a long way. However,... Read More
As soon as almost all computer users already got used... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Working from home has its advantages, including no commute, a... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
So called phishers try to catch the information about the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Every day millions of people go online to find information,... Read More
Someone recently told me, "You would have to be a... Read More
There are folks out there who use their powers for... Read More
The Threat10 years ago you could probably have run no... Read More
First off I should explain what phishing is. Phishing is... Read More
Ok, ok, I know you've seen them. All those pop... Read More
When surfing the Internet you probably take your anonymity for... Read More
The words Corporate Security may conjure up images of a... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Today the internet is a mine field of malicious code... Read More
File sharing on p2p is soaring despite the music and... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Ebay is a great site and is used by many... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Credit card fraud is a growing problem for online businesses... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Nowadays more and more people are using a computer. A... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The top five online scams on the Internet hit nearly... Read More
Before you enter your name, address or any other data... Read More
Watching how the traditional media covers the latest virus or... Read More
We all get the odd virus now and then, but... Read More
As the number of people using the Internet as an... Read More
This is the second in a series of articles highlighting... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
These six ways to prevent identity theft offer you valuable... Read More
Security leaks can be a big problem for any site... Read More
A week or so ago, I received an inquiry from... Read More
First of all we need to get some terms stated.... Read More
First I would like to stress I am condoning the... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Paypal is a great site and is used by many... Read More
If you use emails actively in your communication, you must... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Internet Security |