Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very easy to understand the definition of 'Phishing'. Just replace letter 'F' from the word Fishing with 'Ph'. Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers.

Phishing & Spoof Web sites

The role of hacker is to lure the innocent Netizens by sending an e-mail from spoof sites, pseudo claiming to be an legitimate enterprise in an attempt to force the user into surrendering private information such as password, credit card number, and social security number etc; which will be used for identity theft.

The hyperlink in the e-mail directs the innocent user to a spoof Web site where they are asked to enter personal information like passwords, social security, and bank account numbers. Basically hackers create Spoof Web sites to steal the user's personal information.

The Idea Behind Spoof Sites

I can give you the well-known example in which users received Spam e-mails from hackers misleading innocent users. As if these mails came from eBay, claiming that the user's account was about to be suspended unless he clicked on the hyperlink in the e-mail and update the credit card information hold by the genuine eBay web site. The idea behind this scam is very simple as it is relatively simple to make a Web site look like a legitimate site. That is why the Phishing is also called brand spoofing.

Tips To Stop Phishing & Report Phishing

* If you smell anything fishy (phishy) or if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Simply delete such e-mail and make it thumb rule... never click that hyperlink in the e-mail.

* Contact your bank or financial institution on phone and confirm whether it has sent you such type of e-mail.

* Report Phishing to Federal Trade Commission (FTC).

* Send Internet Phishing scam reports to local authorities like police and crime bureau.

* Send details of a Phishing scam to the Anti-Phishing Working Group (APWG) to help them to build database of Phishing scams, and to alert the Netizens.

* Last but not the least if you can't afford to neglect or you are tempted to think that the hyperlink in the received e-mail is worth to click... take a deep breath, think twice before clicking that suspicious hyperlink and copy and paste the URL (hyperlink) into the web browser's address field and log on. This will help you to land on legitimate Web site instead of spoof Web site.

Popular Targets Of Phishers

1) Banks & Financial Institutions.

2) Credit card companies.

3) Auction portals.

4) Online stores.

5) Online stock trading companies.

How To Smell Phishing?

It is very difficult for e-mail recipients to guess what they have in their mailbox. They can't guess Whether it is legitimate e-mail from an organization With whom they do transactions. Although the "From" Field of the e-mail may have the web site address of That organization, and the hyperlink may also appear, If the sender insists on clicking that hyperlink and Unfortunately you click that hyperlink you will land To a spoof Web site. To avoid this situation you must Have that sense to smell something fishy (phi shy) Because any legitimate web site never ask you to Update your personal information simply by sending a Hyperlink through the e-mail, use your commonsense and Ask yourself a simple question, why the legitimate web Site would ask you to update your personal information through a hyperlink via e-mail, since that organization has its own legitimate web site? I hope you have got the answer.

Krishna Pai is a webmaster and a writer. Get Internet Security tips, Computer Tutorials, reviews, Hardware & Software Tips, How to guides at

http://www.cheapest-computer-hardware-sof tware.com/

For more Computer tips join his "Build Computer ezine" at http://www.cheap est-computer-hardware-software.com/build_computer_ezine.html

In The News:


pen paper and inkwell


cat break through


5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More