What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. The site will instruct you to enter personal information, such as your account ID, your password, your credit or debit card number and PIN, or your social security number. The criminals are "phishing" for information.
Tips for Spotting a Phishing Scam:
A fraudulent email will usually have a sense of urgency, stating that you must respond immediately or your account will be closed or frozen. Also, fraudulent emails and websites will often have obvious spelling errors.
Fraudulent emails will contain links to websites that appear to have an address similar to a Bank or its website name. Remember, it is always safer to type in the website address yourself than to click on a link.
It can be very difficult to determine the true identity of a website based upon its address. Cyber-criminals may use programming tricks to make the address that you see appear different than the true address to which you are directed.
Your greatest protection against online fraud is not to fall victim by taking reasonable steps to protect your private information. Visit the Federal Trade Commission's website at www.FTC.gov/idtheft for more information about online security and how to protect yourself from scams.
1. First and foremost, never provide personal information in response to an unsolicited email.
"ThreatconYellow.com (http://www.threatconyellow.com) will never send you an email in which we ask you to reveal your password or any other private information."
2. Never click on links in unsolicited emails.
If you receive an unsolicited email that appears to be from your bank, go directly to one of your banks websites by typing in the whole Internet address. If a legitimate alert were issued, you should be able to find that information on the website.
If you think that you may have revealed information to someone not legitimately connected your Bank:
1. Contact your Bank immediately!
2. If possible, forward the fraudulent email to the Bank without changing the subject line, and then delete it from your inbox.
When banking online, change your password frequently ? At least every 90 days, but you may change it more frequently if you are concerned that your account information might have been compromised.
(http://www.threatconyellow.com/phishing.htm)
Join the War on Crime: Get updated "Amber Alerts" at ThreatconYellow.com.
Get free "Consumer Advisory Alerts". Join the ThreatconYellow.com "Opt-out" mailing list at (http://www.threatconyellow.com). ThreatConYellow.com is one of the Internet's leading resources for self defense weapons, pepper sprays, stun guns, and home safety and protection products.
As more people are logging onto the Internet everyday, Network... Read More
The money being spent online is steadily growing. With billions... Read More
As you know, this time the virus under the name... Read More
Phishing is a relatively new form of online fraud that... Read More
It has been said that with the wealth of information,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Microsoft routinely releases new security updates, many of which are... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If you run any type of Internet business, Adware and... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
A friend called me one day and asked if I... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Spyware is the most troublesome software to appear on the... Read More
First I would like to stress I am condoning the... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
This is not some new fangled techno-speak, it is a... Read More
This is the second in a series of articles highlighting... Read More
Ebay is a great site and is used by many... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Working from home has its advantages, including no commute, a... Read More
Ok, you've got a computer, and you get online. You... Read More
In the past I've never really paid much attention to... Read More
To blog or not to blog? Well, why not? Lots... Read More
Over the past few years as the internet has become... Read More
Shopping for horse gifts or other gift items on the... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Do you sometimes notice your computer running slower. Is your... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
I got a virus the other day, Thursday I believe... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Microsoft routinely releases new security updates, many of which are... Read More
We all get the odd virus now and then, but... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
There are several basic concepts to keep in mind when... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Do you sometimes notice your computer running slower. Is your... Read More
A week or so ago, I received an inquiry from... Read More
These six ways to prevent identity theft offer you valuable... Read More
While clicking from site to site on the internet you... Read More
In a word, no - an email message has always... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Security leaks can be a big problem for any site... Read More
There are ways to insure security though. You can get... Read More
The top five online scams on the Internet hit nearly... Read More
This is not some new fangled techno-speak, it is a... Read More
Spyware is the most troublesome software to appear on the... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Be careful of sites that promise to send you "instant... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
The average computer is packed with hidden software that can... Read More
Computer security for most can be described in 2 words,... Read More
I am the victim of an internet scam. It is... Read More
Let us take the example of scrambling an egg. First,... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Internet Security |