The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."
What is Phishing?
Phishing is a scam initiated via e-mail. Messages are "fishing" for personal and financial information. Most often, e-mails appear to be from reputable companies (internet service providers, telephone companies, etc), banks, and other financial organizations. The e-mail message often gives a story of the bank needing to update its personal information database or a financial institution claiming your personal data had been lost.
Who Phishes?
Hackers and Scammers looking for personal and financial information use phishing as an effective method of gathering information. Phishers imitate legitimate companies in e-mails to entice people to share passwords or credit-card numbers. Recent victims include:
? Bank of America
? Best Buy
? America Online
? eBay
? PayPal
? Washington Mutual
? MSN (Microsoft Network)
History of Phishing
The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the Web page code from a major site - such as AOL - and use that code to set up a replica page that appears to be part of the company's site. (This is why phishing is also called spoofing.) A fake e-mail is sent out with a link to this page, which solicits the user's credit card data or password. When the form is submitted, it sends the data to the scammer while leaving the user on the company's site so they don't suspect a thing.
Avoid Phishing
Fortunately, common sense can save you from giving away your personal information. For example, be aware for the company requesting information. I have received e-mails from banks I have never had business with. Know that your bank or ISP will never ask for your information out of the blue. Banks do not update their databases and misplace information.
Tips To Avoid Phishing
? If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body.
? Look for words misspelled or other grammatical mistakes.
? Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
? If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine.
? If you unknowingly supplied personal or financial information, contact your bank and credit card company immediately.
? Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov.
S. Nestor writes for StormFront Development Group, a pioneer in Internet Marketing. Contact him at snestor@stormfrontdevelopment.com
Shopping for horse gifts or other gift items on the... Read More
This is not some new fangled techno-speak, it is a... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Spyware is the most troublesome software to appear on the... Read More
Have you ever had to call Symantec or McAfee to... Read More
Identity Theft is one of the most serious problems facing... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
The Internet is a vast International Network of people and... Read More
A little bit of time invested into learning about internet... Read More
If you use the internet, you have probably been infected... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Over £5 billion pounds was spent on online shopping in... Read More
The most frustrating part of having Spyware on your computer... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Since its birth, the Internet has grown and expanded to... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
You may not realize it, but as you are surfing... Read More
A friend called me one day and asked if I... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
You've seen it in the news - 40 million credit... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
In today's times spyware is a very serious issue and... Read More
There are folks out there who use their powers for... Read More
There has not been a time in the history of... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Identity theft is one of the most common criminal acts... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Let us take the example of scrambling an egg. First,... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Have been an Internet user for more than 9 years,... Read More
Did you know...? 1 in 5 children who use computer... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
This is not some new fangled techno-speak, it is a... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
If you have used a Windows machine for a while,... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Well, this is an article I never thought I would... Read More
Do you really have to know how feeds work? Not... Read More
A week or so ago, I received an inquiry from... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
A little bit of time invested into learning about internet... Read More
Despite the current wave of identity theft and corporate security... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
My first experience with a spyware BHO based infection was... Read More
Spyware is software that runs on a personal computer without... Read More
You can detect spyware online using free spyware cleaners and... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
History and BackgroundThe virus was one of the first ever... Read More
These six ways to prevent identity theft offer you valuable... Read More
A couple of years back, I paid my dues the... Read More
A couple of days ago, I was searching for a... Read More
Internet Security |