Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.
To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. The issue, though, is the pretence of such mail.
You may not even have such an account as referenced.
It doesn't come from the account provider.
It can use false S.S.L. references, to present an illusion of trust and security.
It can prompt for immediate action on your part, alleging false log-in's by persons unknown, and from countries unknown. If action is not taken, they can impress on you, that the account will be suspended or closed. Indeed, anything likely to work can be fabricated, to get you to the webpage suggested in the link or hyperlink. Note the word "suggested". Likenesses to company logos are used to re-enforce "credibility".
In fact, these phishing attempts actually look pretty good or realistic. So much so that any qualms of guilt or stupidity, experienced by a "conned party" are groundless.
Experience, specific education or forewarning, is all that prevents this type of charade from widening its base of "victims".
The goal is to get you to type in your details, complete with credit card number and the rest can be guessed.
Some damage is also absorbed by the organisation or company being misrepresented and they can do little about it but warn their customers what to watch out for, and issue security instructions. Indeed, it is from accounts at reputable companies that most passing trade learn the correct or most secure procedures. It is therefore important to read any material that they offer.
Generally though, reputable companies with a mind to preserve their integrity will tell you to log-in at their main page and proceed from there. Not through a link specific to your account!
Hyperlinks can mask the true domain that you'll be brought to, with the text linked to www.anydomaindotcom (example, only), a replica or fake page. Only going to secure pages where one believes that "https" will do it, will always help but wholly unreliable. The "s" is an indication of a secure page, but are you at the right domain?
Place your mouse over the link and the domain attached to such a link, should show itself. Viewing the source code is another way but some knowledge of it is necessary.
Another ploy, sometimes deliberate and sometimes "convenient", is inserting a reference to the "legitimate company" anywhere after the domain name. Ex. https://www.anydomaindotcom/ebay/aagle/. Unwary victims may overlook the fact that "ebay" is not the domain, but see it anyway as a directory or file name. Anyone, anywhere can have a file or directory named like that of a company.
To make matters somewhat worse from an "easy to identify" viewpoint, the source code of the link can be represented as an I.P. address rather than its named counterpart. There are some tools that you can use at http://centralops.net/co/ which you can use to type in the I.P. address and cross reference it with the official account domain presented in the e-mail, or web page for that matter. Opening a second window for investigative purposes and re-sizing both to be side by side can be revealing, and comparisons be made between the alleged source and that of the source code.
www.ebay.com can be put in one window and www.suspiciouslyspurious.com can be put in the other. NOTE; you should be checking domains and ignoring everything that comes after the forward slash at the end of the domain. A similar test can be done for email viruses, where suspicious email addresses can be searched for some degree of authenticity.
If you are phished, try to learn as much as possible about it as phishing attempts and email viruses have some aspects in common. Incorrect spelling is one of them. You must understand that the authors can be from anywhere and not necessarily have degrees in English. Legitimate companies can also be from anywhere, with different primary languages, but do perfect their spellings and general grammar.
Attention to upper and lower case can be another giveaway. This is especially true where particular portions of the text are the design of the author, and not just copied and pasted. Typically, these portions are customised to be customer specific in a general sense, and fonts may even be different or out of place. Such "special" additions are to strengthen the sense of urgency and call to action.
Should you be the recipient of "phishy mail", you can forward it to spam@uce.gov
Seamus Dolly and phising samples are at http://www.CountControl.com/phishy.html
Spies, spyware, internet parasites are among what they are usually... Read More
Have been an Internet user for more than 9 years,... Read More
A couple of days ago, I was searching for a... Read More
Many of us have run into an annoying and time-consuming... Read More
Security leaks can be a big problem for any site... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Over the past few years as the internet has become... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Shopping for horse gifts or other gift items on the... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
If you run any type of Internet business, Adware and... Read More
When the Internet first came about, it was realized it... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Spyware and adware are becoming major problems for online surfers... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
The words Corporate Security may conjure up images of a... Read More
So called phishers try to catch the information about the... Read More
Nowadays more and more people are using a computer. A... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Spyware is the most troublesome software to appear on the... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
When surfing the Internet you probably take your anonymity for... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Is your data secure? Think again. Securing data is unlike... Read More
First off I should explain what phishing is. Phishing is... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
I am the victim of an internet scam. It is... Read More
Have you ever had to call Symantec or McAfee to... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
This is the second in a series of articles highlighting... Read More
Computer security for most can be described in 2 words,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Recently I have received email from my bank/credit Card Company,... Read More
If you are wondering how to fight spyware for safe... Read More
Phishing is a relatively new form of online fraud that... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
If you are a parent, as am I, I think... Read More
My first experience with a spyware BHO based infection was... Read More
Long gone are the days that we could feel secure... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
With the advent of the World Wide Web, a whole... Read More
When surfing the Internet you probably take your anonymity for... Read More
There you are busily typing away on your PC or... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Imagine my surprise when I received a phone call from... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
A few nights ago I received an email from "2CO"... Read More
It has been said that with the wealth of information,... Read More
Before you enter your name, address or any other data... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
When we think of adware, what comes to mind are... Read More
I got a virus the other day, Thursday I believe... Read More
Since its birth, the Internet has grown and expanded to... Read More
First off I should explain what phishing is. Phishing is... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Internet Security |