"Pfishing", sometimes spelled "Phishing", is a word that's used to describe a method of identity theft where con men use fake e-mail that looks like it comes from legitimate sources. This e-mail is designed to hoodwink you into giving out personal and financial information. Once the scammers receive your information they use it to either clone your identity or to empty out your bank accounts and run up your charge cards. Here are some tips on how to avoid becoming the next victim.
1. Never respond to an e-mail that looks like it came from your bank or any of your credit card issuers no matter how official it appears. Phishing scam e-mails will tell you that there is some problem with your account and that you have to click on an embedded link to correct that problem. They may threaten to close your account, or report you to the credit bureau, if you do not respond. DON'T DO IT. Don't call the telephone number that appears in the email either. Get out one of your old bank or credit card statements and call the number that appears there. Explain what the email says and follow the directions that you receive from the actual employee. Chances are they'll tell you its a scam.
2. Never give your bank account information, credit card numbers, Social Security number, passwords, personal identification numbers (PIN), or Date of Birth to anyone who asks you for that information by email. No legitimate company will expect you to reveal sensitive information via email. Also, no company that issues you a PIN will ever ask you to reveal that PIN to any of their employees.
3. Never respond to any offer to buy anything by clicking on the link in the e-mail. Even if the e-mail looks like it comes from your favorite department store it might be a scam. To avoid being hooked by Pfishing, type in the URL to the department store by yourself. Go to Google.com to look it up if you don't already know it.
4. Forward copies of any Pfishing email to the actual company or bank that is being imitated by the scammers. You can usually send any email to postmaster@ and then the bank or company name.
5. If a Pfishing e-mail seems particularly threatening or worrisome to you, report it to the Internet Crime Complaint Center (www.ifccfbi.gov), a partnership between the FBI and the National White Collar Crime Center.
6. If it's too late and you already provided any of your personal information, account numbers, or PINs then you should immediately contact your banks and credit card companies to make arrangements with them to protect your financial interests. These companies and institutions are familiar with these scams and they know what needs to be done.
7. If you receive evidence of identity theft, such as unauthorized charges on your credit card bills, or unexplained transactions in your bank account, contact the police and file a report. Be sure to get a copy of the report for your own records and to send to the companies that are involved in the transactions. You also need to contact all three major credit bureaus (Equifax at 800-525-6285, Experian at 888-397-3742 and TransUnion at 800-680-7289) and tell them that you need a fraud alert placed on your credit file.
8. You can get information on ID theft and Pfishing at the Federal Trade Commission Web site at www.ftc.gov or calling toll-free 877-382-4357.
Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get resources, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-softwa re.com/52ways.html
![]() |
|
![]() |
|
![]() |
|
![]() |
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
Siebel is traditional CRM market leader, however and mostly due... Read More
If you are in a business that passes documents around... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
Should one use Windows Update?This topic has good and valid... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
The world of small business accounting software can be a... Read More
Now that spyware is the single most dangerous threat to... Read More
Software development is a risky business.Many software developers are barely... Read More
Just imagine: you are walking, say, towards your car, and... Read More
When reading an article where some term is used often,... Read More
Microsoft CRM is now on the scene and it is... Read More
OEComplete is a utility for managing the personal information of... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
The cornerstone of successful automated office systems is the ability... Read More
I provide, here clear explanations and a count of function... Read More
The COSMIC FP (function point) software quality metric, is no... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More
There are several kinds of software piracy. The bottom line... Read More
This article illustrates the best practices to improve the performance... Read More
Each Industry and market niche has business specific and unique... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More
We would like to give you pluses and minuses of... Read More
Scrapbooks are very popular these days. I think that almost... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
In this small article we will show you the possible... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Looks like Microsoft Great Plains becomes more and more... Read More
It is now common thing when large corporation selects mid-market... Read More
If you have Microsoft Great Plains and support it for... Read More
Usually, the easiest way to tell you have spyware is... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
The java programming language is becoming more and more popular... Read More
Java has come along a long way. Many would agree... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
Microsoft CRM is new player on the CRM software... Read More
Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More
This article is the fourth of a series of articles... Read More
Around the same time Microsoft made its move with .Net... Read More
Google Inc. has launched a new software package that allows... Read More
It is a well known fact that Java as a... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
When you double-click a layer in the Layer Palette, you... Read More
All your software is stored on a hard-drive. But how... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
When reading an article where some term is used often,... Read More
Microsoft Business Solutions Great Plains has Project Accounting module where... Read More
User interfaces and accessibility are some of the most important... Read More
Microsoft CRM is winning market share step-by-step from such the... Read More
Spyware is software or hardware installed on a computer without... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
We are in a transition phase in the Managerial Administration... Read More
Have you ever noticed that when you look at your... Read More
Pirated software is on the increase and now accounts for... Read More
Are you a database professional? Do you work with a... Read More
The intentions of this short tutorial are not to teach... Read More
After seeing many people complain about their weak Internet security... Read More
The Microsoft system preparation utility for Windows 2000 is a... Read More
TikiWiki is open source software - it is written in... Read More
Software |