How To Avoid Getting Hooked By Pfishing

"Pfishing", sometimes spelled "Phishing", is a word that's used to describe a method of identity theft where con men use fake e-mail that looks like it comes from legitimate sources. This e-mail is designed to hoodwink you into giving out personal and financial information. Once the scammers receive your information they use it to either clone your identity or to empty out your bank accounts and run up your charge cards. Here are some tips on how to avoid becoming the next victim.

1. Never respond to an e-mail that looks like it came from your bank or any of your credit card issuers no matter how official it appears. Phishing scam e-mails will tell you that there is some problem with your account and that you have to click on an embedded link to correct that problem. They may threaten to close your account, or report you to the credit bureau, if you do not respond. DON'T DO IT. Don't call the telephone number that appears in the email either. Get out one of your old bank or credit card statements and call the number that appears there. Explain what the email says and follow the directions that you receive from the actual employee. Chances are they'll tell you its a scam.

2. Never give your bank account information, credit card numbers, Social Security number, passwords, personal identification numbers (PIN), or Date of Birth to anyone who asks you for that information by email. No legitimate company will expect you to reveal sensitive information via email. Also, no company that issues you a PIN will ever ask you to reveal that PIN to any of their employees.

3. Never respond to any offer to buy anything by clicking on the link in the e-mail. Even if the e-mail looks like it comes from your favorite department store it might be a scam. To avoid being hooked by Pfishing, type in the URL to the department store by yourself. Go to Google.com to look it up if you don't already know it.

4. Forward copies of any Pfishing email to the actual company or bank that is being imitated by the scammers. You can usually send any email to postmaster@ and then the bank or company name.

5. If a Pfishing e-mail seems particularly threatening or worrisome to you, report it to the Internet Crime Complaint Center (www.ifccfbi.gov), a partnership between the FBI and the National White Collar Crime Center.

6. If it's too late and you already provided any of your personal information, account numbers, or PINs then you should immediately contact your banks and credit card companies to make arrangements with them to protect your financial interests. These companies and institutions are familiar with these scams and they know what needs to be done.

7. If you receive evidence of identity theft, such as unauthorized charges on your credit card bills, or unexplained transactions in your bank account, contact the police and file a report. Be sure to get a copy of the report for your own records and to send to the companies that are involved in the transactions. You also need to contact all three major credit bureaus (Equifax at 800-525-6285, Experian at 888-397-3742 and TransUnion at 800-680-7289) and tell them that you need a fraud alert placed on your credit file.

8. You can get information on ID theft and Pfishing at the Federal Trade Commission Web site at www.ftc.gov or calling toll-free 877-382-4357.

Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get resources, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-softwa re.com/52ways.html

In The News:


pen paper and inkwell


cat break through


FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Great Plains Dexterity Programming ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Microsoft CRM or Siebel

Siebel is traditional CRM market leader, however and mostly due... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Should I Use Windows Update?

Should one use Windows Update?This topic has good and valid... Read More

IT Department Skills to Support Microsoft Great Plains and Microsoft CRM

Microsoft Great Plains as ERP and Microsoft CRM as... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

How To Develop Software For Your Business

Software development is a risky business.Many software developers are barely... Read More

Downloading Spyware Removers: Think Before, not After

Just imagine: you are walking, say, towards your car, and... Read More

Spyware, Adware, etc. -- Terms and Common Sense

When reading an article where some term is used often,... Read More

Microsoft CRM Modification ? Overview for IT Specialist

Microsoft CRM is now on the scene and it is... Read More

OEComplete ? A Personal Information Manager

OEComplete is a utility for managing the personal information of... Read More

Crystal Reports - Microsoft SQL Server

Microsoft SQL Server is the leader for inexpensive and middle... Read More

Bridging the Gap between Paper and Data

The cornerstone of successful automated office systems is the ability... Read More

A Symons Mark II Function Point Counting Example

I provide, here clear explanations and a count of function... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Software Piracy

SOFTWARE PIRACY We regularly hear reports... Read More

Microsoft Great Plains: Large Scale Implementation

Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More

What is Software Piracy?

There are several kinds of software piracy. The bottom line... Read More

Performance Tuning of a Daffodil DB / One$DB -JDBC Application

This article illustrates the best practices to improve the performance... Read More

Microsoft Great Plains Jewelry ? Implementation & Customization Overview

Each Industry and market niche has business specific and unique... Read More

Lotus Domino: Reports and Connectors ? Crystal Reports, XML, ODBC/JDBC, OLE

Lotus Notes Domino is very efficient in electronic document workflow... Read More

10 Steps To Secure And Manage Your Passwords

Passwords protect your most sensitive personal, financial and business information.... Read More

OLAP, An Alternative Technology Over Spreadsheets

Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More

Microsoft CRM Implementation & Remote Support

We would like to give you pluses and minuses of... Read More

Scrap Booking Online: Word Perfect or Corel Graphics Suite?

Scrapbooks are very popular these days. I think that almost... Read More

The Software 2005 Conference - A Review

The Software 2005 conference is now a wrap. This conference,... Read More

Microsoft Great Plains: carpet, textile, fabric, felt distributor ? implementation overview

In this small article we will show you the possible... Read More

Microsoft Great Plains international implementation ? USA / Mexico ? overview for consultant

Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More

Microsoft Great Plains Reporting ? Overview for Developer

Looks like Microsoft Great Plains becomes more and more... Read More