Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. The site will instruct you to enter personal information, such as your account ID, your password, your credit or debit card number and PIN, or your social security number. The criminals are "phishing" for information.

Tips for Spotting a Phishing Scam:

A fraudulent email will usually have a sense of urgency, stating that you must respond immediately or your account will be closed or frozen. Also, fraudulent emails and websites will often have obvious spelling errors.

Fraudulent emails will contain links to websites that appear to have an address similar to a Bank or its website name. Remember, it is always safer to type in the website address yourself than to click on a link.

It can be very difficult to determine the true identity of a website based upon its address. Cyber-criminals may use programming tricks to make the address that you see appear different than the true address to which you are directed.

Your greatest protection against online fraud is not to fall victim by taking reasonable steps to protect your private information. Visit the Federal Trade Commission's website at www.FTC.gov/idtheft for more information about online security and how to protect yourself from scams.

1. First and foremost, never provide personal information in response to an unsolicited email.

"ThreatconYellow.com (http://www.threatconyellow.com) will never send you an email in which we ask you to reveal your password or any other private information."

2. Never click on links in unsolicited emails.

If you receive an unsolicited email that appears to be from your bank, go directly to one of your banks websites by typing in the whole Internet address. If a legitimate alert were issued, you should be able to find that information on the website.

If you think that you may have revealed information to someone not legitimately connected your Bank:

1. Contact your Bank immediately!

2. If possible, forward the fraudulent email to the Bank without changing the subject line, and then delete it from your inbox.

When banking online, change your password frequently ? At least every 90 days, but you may change it more frequently if you are concerned that your account information might have been compromised.

(http://www.threatconyellow.com/phishing.htm)

Join the War on Crime: Get updated "Amber Alerts" at ThreatconYellow.com.

Get free "Consumer Advisory Alerts". Join the ThreatconYellow.com "Opt-out" mailing list at (http://www.threatconyellow.com). ThreatConYellow.com is one of the Internet's leading resources for self defense weapons, pepper sprays, stun guns, and home safety and protection products.

In The News:


pen paper and inkwell


cat break through


Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More