Phishing - Identity Theft & Credit Card Fraud

What is Phishing?
Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of social engineering, by posing as a different person or organization that you already trust.

How does Phishing Work?
The most common form of Phishing is done by sending out fraudulent e-mails, that lead back to websites that look legitimate. Normally an e-mail is sent to a huge amount of people stating in very general terms that you should come to their website and update your information, or provide them with some new information they need, or some other similar excuse. When you click on the link in the e-mail it will take you to a website that looks very similar to the one you are expecting, you enter your information, and now they've got you. Another method is to open a popup windows asking information, on top of the real legitimate website.

How can I identify a scam e-mail?
There are several major things to look out for that will lead you to believe the e-mail is fraudulent. Quite often the e-mails will be HTML based, not plain text, this allows them to put active links that display a legitimate website, but the coding behind it takes you to a different website.

Often new websites are registered with altered spellings of major corporations and organizations, or the link will lead directly to an IP address (ie 24.38.122.156) instead of a website domain (ie www.website.com).

Another very quick way to identify a false e-mail is to see who it is address to. Normally e-mails that are fraudulent in nature are addressed to "Dear Customer" as opposed to your real name, and often they are e-mailed to many users at one time.

No legitimate organization should ever ask you to provide you with personal information via e-mail. If any e-mail ever asks you to e-mail them your private information, you should report this e-mail to the company they are posing as.

How can I avoid falling for a Phishing scam?
If you believe the e-mail could be legitimate, don't click on the link in the e-mail, instead open up your web browser, and use the link/favorite you already have, or type in the website yourself in to the URL box. This will guarantee that you are using the correct legitimate website!

Using the same method to get to the website as mentioned above, go to the organizations help page or contact page and ask them about the e-mail they may have sent you. You can also forward them the e-mail to a known legitimate e-mail address at their organization.

What if I already fell for this scam?
If you have mistakenly been taken in by this kind of scam there is several very important steps you need to take. First, report that you have been tricked by this method to your credit card companies, and other financial institutions.

Report that you have been tricked to the company that you thought you were legitimately updating information for. If you can provide them with the e-mail that tricked you, it may be useful for helping to reduce the impact on other people around the world.

Change all your passwords and PIN numbers for all your financial institutions and websites immediately.

Monitor your credit card statements, financial slips and balances. If you notice a discrepancy, immediately contact your financial organization and let them know about the fraudulent activity. In addition most banks should be able to add you to a fraud report list that will stay on your credit report that will make it harder for people to create new credit cards or open accounts without providing legitimate identification in person. Finally, you should contact your local police or law enforcement organization and file an incident report to cover yourself should illegal activities happen!

Ken Dennis http://KenDennis-RSS.homeip.net/

In The News:


pen paper and inkwell


cat break through


How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More