The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. Learn how to Protect To Yourself Now!
A Typical E-Mail Identity Theft Scam will send you an e-mail requesting that you update your Bank Account Information. Often this request to update your account is made under some false pretence like it is suspended or has been suspected of Fraudulent use.
E-bay has an excellent online Tutorial that teaches how to spot and protect yourself from spoof e-mails, While this Tutorial talks specifically about E-Bay many of the Tell Tale Signs are very Similar and would apply to E-Mail Identity Theft Scams http://ewguru.com/spoof-emails
Here are 8 Surefire ways to spot an E-Mail Identity Theft Scam E-Mail
1 - Wrong E-Mail Address
Any E-mail Sent to an E-mail Address that is Not the E-mail Account you used when you signed up for the account is more then likely a scam.
2 - Fake links.
While many emails have links included, just remember that these links can be forged too. It is always best to type the e-mail address of the bank directly into your browser window (http://www.yourbank.com)
3 - Requests Personal Information
Any E-mail that requests you enter personal information like User ID, password or bank account number either by clicking on a link in the E-mail or completing a form within the e-mail are a strong indication the e-mail is a SCAM
4 - Urgent Subject Lines
Subject likes * * * Please Verify & Update Your Account * * *
5 - Generic greetings.
Lot's of emails begin with a Greeting, such as: "Dear Account Holder instead of the Name you used when you registered for your account are more then likely scams. Your bank Knows your Name.
6 - Scare to Action
Many Fake emails try to trick you with the threat that your account is in jeopardy if you don't sign in and fix it NOW!
7 - HTML Website Fakes
Emails that appear to be websites. Some emails will look like a website in order to get you to enter personal information. Banks never asks for personal information in an e-mail.
8. Misspellings and bad grammar
Fake emails may contain misspellings, incorrect grammar, missing words. Many Times these are used to trick the E-mail Filters
A quick review If you receive an E-mail with a Link requesting you to click on the link and sign in to your Bank account, Don't Do It!
If you receive an E-mail that looks like your Banks Sign in Form, Don't Sign in!
If you are unsure if the e-mail is Real or fake call your bank and ask.
About The Author:
Mike Makler has been Marketing Online Since 2001 When he Built an Organization of over 100,000 Members
Get Mike's Newsletter:
http://ewguru.com/newsletter
More Articles by Mike:
http://ewguru.com/tips
Permission Based E_Mail Marketing Methods
http://ewguru.com/hbiz/amazingoffer.html
Copyright © 2005-2006 Mike Makler the Coolest Guy in the Universe
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Ok, you've got a computer, and you get online. You... Read More
Phishing is a relatively new form of online fraud that... Read More
History and BackgroundThe virus was one of the first ever... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Huge number of spyware software applications are available in the... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Someone recently told me, "You would have to be a... Read More
The first thing people think about when defending their computers... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Business on the internet is getting down right shameless. This... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
My first experience with a spyware BHO based infection was... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
To blog or not to blog? Well, why not? Lots... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Today the internet is a mine field of malicious code... Read More
Over the past few years as the internet has become... Read More
The words Corporate Security may conjure up images of a... Read More
So called phishers try to catch the information about the... Read More
Have been an Internet user for more than 9 years,... Read More
Only the top spyware removers are successful at detecting and... Read More
A friend called me one day and asked if I... Read More
Credit card fraud is a growing problem for online businesses... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Before we start, I want to make it clear that... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Viruses are, however, not the only malicious software programs out... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
They're out there. Individuals trying to make a quick buck... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
As soon as almost all computer users already got used... Read More
Identity Theft is one of the most serious problems facing... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
There is no doubt that "how-to articles" have become a... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Viruses are, however, not the only malicious software programs out... Read More
Well, this is an article I never thought I would... Read More
We all get the odd virus now and then, but... Read More
While clicking from site to site on the internet you... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
This is the second in a series of articles highlighting... Read More
Long gone are the days that we could feel secure... Read More
First off I should explain what phishing is. Phishing is... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
There are several basic concepts to keep in mind when... Read More
The Message Must Get Through The year is 300A.D.,... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
A week or so ago, I received an inquiry from... Read More
What is computer security? Computer security is the process of... Read More
Before we start, I want to make it clear that... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Internet Security |