Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from http://Identity-Theft-Prevention-Guide.com

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.
    Visit: http://Identity-Theft-Prevention-Guide.com

    In The News:


  • pen paper and inkwell


    cat break through


    Secrets On Security: A Gentle Introduction To Cryptography

    Let us take the example of scrambling an egg. First,... Read More

    Phishing and Pharming: Dangerous Scams

    As soon as almost all computer users already got used... Read More

    Spyware Removal

    Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

    Internet Privacy

    Over the past few years as the internet has become... Read More

    Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

    Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

    Phishing - A High Tech Identity Theft With A Low Tech Solution

    Have you ever got an email asking you to confirm... Read More

    Online Cell Phone Scams and Spam

    They're out there. Individuals trying to make a quick buck... Read More

    Information Security for E-businessmen: Just a Couple of Ideas

    If you constantly deal with bank or electronic accounts, it... Read More

    Top 10 tips for Safe Internet Shopping

    Over £5 billion pounds was spent on online shopping in... Read More

    How to Get Rid of New Sobig.F Virus?

    As you know, this time the virus under the name... Read More

    Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

    Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

    How to Fight Spyware

    If you are wondering how to fight spyware for safe... Read More

    HackAttack

    P C. owners are constantly at risk from attacks by... Read More

    How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

    Spyware/adware is a new major concern for PC users everywhere.... Read More

    How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

    If you use the internet, you have probably been infected... Read More

    Social Engineering - The Real E-Terrorism?

    One evening, during the graveyard shift, an AOL technical support... Read More

    Spyware, This Time Its Personal!

    First the basic definition of Spyware: It is a type... Read More

    Watch Out For That Scam

    The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

    Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

    Is your enterprise following the rules?The bulk of financial information... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    Three-pronged Trojan Attack Threatens Security on the Internet

    Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

    Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

    The money being spent online is steadily growing. With billions... Read More

    Securities

    NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

    Viruses, Trojans, and Spyware - Oh My!

    Have you ever had to call Symantec or McAfee to... Read More

    Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

    Sooner or later everyone with an email account will receive... Read More

    Top Five Spyware Fighting Tips

    Spyware and adware are becoming major problems for online surfers... Read More

    All About Computer Viruses

    Your computer is as slow as molasses. Your mouse freezes... Read More

    Cybercriminals Trick: Targeted Trojan-Containing Emails

    Threats we ordinary Web users face online leave us no... Read More

    If You Steal It, They May Come!

    Business on the internet is getting down right shameless. This... Read More

    From Spyware with Love!

    It's late. You've been scouring the web for that perfect... Read More

    Web Browsing - Collected Information

    You may not realize it, but as you are surfing... Read More

    Computer Security

    What is computer security? Computer security is the process of... Read More

    Mail Forwarding - Why Would You Do It?

    First of all we need to get some terms stated.... Read More