Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.
To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. The issue, though, is the pretence of such mail.
You may not even have such an account as referenced.
It doesn't come from the account provider.
It can use false S.S.L. references, to present an illusion of trust and security.
It can prompt for immediate action on your part, alleging false log-in's by persons unknown, and from countries unknown. If action is not taken, they can impress on you, that the account will be suspended or closed. Indeed, anything likely to work can be fabricated, to get you to the webpage suggested in the link or hyperlink. Note the word "suggested". Likenesses to company logos are used to re-enforce "credibility".
In fact, these phishing attempts actually look pretty good or realistic. So much so that any qualms of guilt or stupidity, experienced by a "conned party" are groundless.
Experience, specific education or forewarning, is all that prevents this type of charade from widening its base of "victims".
The goal is to get you to type in your details, complete with credit card number and the rest can be guessed.
Some damage is also absorbed by the organisation or company being misrepresented and they can do little about it but warn their customers what to watch out for, and issue security instructions. Indeed, it is from accounts at reputable companies that most passing trade learn the correct or most secure procedures. It is therefore important to read any material that they offer.
Generally though, reputable companies with a mind to preserve their integrity will tell you to log-in at their main page and proceed from there. Not through a link specific to your account!
Hyperlinks can mask the true domain that you'll be brought to, with the text linked to www.anydomaindotcom (example, only), a replica or fake page. Only going to secure pages where one believes that "https" will do it, will always help but wholly unreliable. The "s" is an indication of a secure page, but are you at the right domain?
Place your mouse over the link and the domain attached to such a link, should show itself. Viewing the source code is another way but some knowledge of it is necessary.
Another ploy, sometimes deliberate and sometimes "convenient", is inserting a reference to the "legitimate company" anywhere after the domain name. Ex. https://www.anydomaindotcom/ebay/aagle/. Unwary victims may overlook the fact that "ebay" is not the domain, but see it anyway as a directory or file name. Anyone, anywhere can have a file or directory named like that of a company.
To make matters somewhat worse from an "easy to identify" viewpoint, the source code of the link can be represented as an I.P. address rather than its named counterpart. There are some tools that you can use at http://centralops.net/co/ which you can use to type in the I.P. address and cross reference it with the official account domain presented in the e-mail, or web page for that matter. Opening a second window for investigative purposes and re-sizing both to be side by side can be revealing, and comparisons be made between the alleged source and that of the source code.
www.ebay.com can be put in one window and www.suspiciouslyspurious.com can be put in the other. NOTE; you should be checking domains and ignoring everything that comes after the forward slash at the end of the domain. A similar test can be done for email viruses, where suspicious email addresses can be searched for some degree of authenticity.
If you are phished, try to learn as much as possible about it as phishing attempts and email viruses have some aspects in common. Incorrect spelling is one of them. You must understand that the authors can be from anywhere and not necessarily have degrees in English. Legitimate companies can also be from anywhere, with different primary languages, but do perfect their spellings and general grammar.
Attention to upper and lower case can be another giveaway. This is especially true where particular portions of the text are the design of the author, and not just copied and pasted. Typically, these portions are customised to be customer specific in a general sense, and fonts may even be different or out of place. Such "special" additions are to strengthen the sense of urgency and call to action.
Should you be the recipient of "phishy mail", you can forward it to spam@uce.gov
Seamus Dolly and phising samples are at http://www.CountControl.com/phishy.html
![]() |
|
![]() |
|
![]() |
|
![]() |
When it comes to reporting Internet scams most of us... Read More
This is the second in a series of articles highlighting... Read More
There are folks out there who use their powers for... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
It's late. You've been scouring the web for that perfect... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
If you are wondering how to fight spyware for safe... Read More
While clicking from site to site on the internet you... Read More
Business on the internet is getting down right shameless. This... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
This is not some new fangled techno-speak, it is a... Read More
These six ways to prevent identity theft offer you valuable... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
A couple of days ago, I was searching for a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Threats we ordinary Web users face online leave us no... Read More
If you use emails actively in your communication, you must... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
When it comes to a secure website and passwords it... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
There are several basic concepts to keep in mind when... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
During the release of a new software product specialized to... Read More
Today,on most internet user's computers, we have the ability to... Read More
Many of us have run into an annoying and time-consuming... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
If you are a parent, as am I, I think... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Do you really have to know how feeds work? Not... Read More
With the advent of the World Wide Web, a whole... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Since its birth, the Internet has grown and expanded to... Read More
Millions of people make purchases online, but many people are... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
The average computer is packed with hidden software that can... Read More
Whether we like it or not, we are all living... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Do you really have to know how feeds work? Not... Read More
To blog or not to blog? Well, why not? Lots... Read More
Imagine my surprise when I received a phone call from... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
A little bit of time invested into learning about internet... Read More
Fishing on the Internet has come a long way. However,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Have you ever got an email asking you to confirm... Read More
Phishing is a relatively new form of online fraud that... Read More
History and BackgroundThe virus was one of the first ever... Read More
Today the internet is a mine field of malicious code... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
In 1997, I decided after 15 years as a practicing... Read More
Internet Security |