Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed.
Phishing is one of the main scams in the present moment. People set up phoney websites and email addresses. Then they spam Email inboxes with official-looking messages explaining that your account with Company X has encountered a problem and that they need you to login and confirm some details. The email addresses are masked to appear official and the links provided in the email all seem to check out. If you click on the link provided then you will usually be taken to a site that looks for all intents and purposes to be official. When you click 'submit' your details will be sent to a criminal somewhere who will do as they please with your information, such as withdrawing money from a bank account or purchasing things in your name.
The scam has been labelled 'Phishing' because the criminals engaging in the activity behave similarly to a fisherman throwing bait out in the hope that they'll receive just one bite from the millions of people that receive the email.
So how do you avoid these online scams? First and foremost, it is important to realise that no legitimate organisation should be sending you a request to fill out your personal details because of some server error or for any other reason. Your bank will never send you an email with content along the lines of "We've lost your bank account number and password... please supply them again for our records". You should also know that no bank is going to require your social security number, bank account number, and PIN number just to log in to your account or retrieve your password. Other sites such as Ebay, PayPal, and the like will not email you asking for these details either.
If you're a little unsure as to whether or not an email is official, scroll down a bit until you find the link that they are requesting you to click and simply hold your mouse pointer over the link text without clicking. Now take a look at the bottom left-hand corner of your browser window. The link text is often the address that the phisher wants you to think you will be heading to but the real address will be revealed in the bottom of the browser. This address will most likely not have anything whatsoever to do with the company that the email is attempting to imitate. It could be a dodgy web site or even just a page on someone's personal computer. If the address doesn't appear in the bottom left-hand corner then you can right-click on the link, select 'properties' from the pop-up menu and then read the address listed in the information box.
To avoid further scams make sure that you have updated firewall and anti-virus software active on your system at all times. This will make it harder for anyone to install key loggers, Trojans, spyware, or other similar devices intended to retrieve your information. Keep your operating system up to date with the latest security patches and updates and be careful where you enter your details. Always look into the reputability of the site that is requesting your details and keep an eye on the lower right-hand corner of your browser. If the page you are viewing has a little padlock symbol appear in the corner, then it means that your details are being secured by some encryption method. You can double click on the icon to get more details if you wish. Sites without the padlock icon don't have encryption, which means that your details are a lot easier for malicious crooks to get a hold of.
Even if you're sure the website is legitimate, it's not a good idea to send your details over an unsecured connection. By the way, email does not count as a secure connection, and neither does any instant messaging program, (such as MSN, ICQ, Yahoo Messenger, AIM etc.) so don't give out personal details that way either.
Another common scam very similar to phishing involves the emailing of promises of great wealth. Seriously, what do you think your chances are of winning the lottery, let alone one that you never even entered? Or of some obscure yet ridiculously rich person in Africa dying and you being legally allowed to pick up their money? Or of a foreign prince wishing to smuggle money out of his country using your account? These emails are all scams. I wish it were true that I won three different lotteries every single day, but if you get in contact with the people sending these messages they're going to do their utmost to clean out your pockets. Unfortunate as it may sound, the 'Please Donate to Charity' emails sent are usually also scams.
If you really want to donate money to a charity, look them up and send it the usual way, don't respond to a multi-recipient email that may or may not be real. You also shouldn't donate to some random charity that no one has ever heard of before. Some of the Internet lowlifes have started up fake charities, 'dedicated to helping Tsunami victims' or similar and are simply pocketing the donations.
Everything in this world can be used for either good or evil purposes and the Internet is no exception. Staying alert and having just a little bit of Internet know-how can keep you out of harm's way for the majority of the time, and allow you access to the wonderful online services available with relative safety.
Daniel Punch
http://www.m6.net
When it comes to a secure website and passwords it... Read More
As the number of people using the Internet as an... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Today the internet is a mine field of malicious code... Read More
Credit card fraud is a growing problem for online businesses... Read More
The words Corporate Security may conjure up images of a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Computer security for most can be described in 2 words,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Business on the internet is getting down right shameless. This... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
In 1997, I decided after 15 years as a practicing... Read More
You've seen it in the news - 40 million credit... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Ok, you've got a computer, and you get online. You... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Only the top spyware removers are successful at detecting and... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Millions of people make purchases online, but many people are... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Have you ever got an email asking you to confirm... Read More
Some months ago, before there was much publicity regarding phishing... Read More
If you are wondering how to fight spyware for safe... Read More
Long gone are the days that we could feel secure... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
If you are a parent, as am I, I think... Read More
Viruses are, however, not the only malicious software programs out... Read More
In the past I've never really paid much attention to... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
It has been said that with the wealth of information,... Read More
Every single time you access a website, you leave tracks.... Read More
Let us take the example of scrambling an egg. First,... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Well, this is an article I never thought I would... Read More
First I would like to stress I am condoning the... Read More
At this point, if you've got the whole "turning the... Read More
Someone recently told me, "You would have to be a... Read More
There is no doubt that "how-to articles" have become a... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
You may not realize it, but as you are surfing... Read More
To blog or not to blog? Well, why not? Lots... Read More
Ok, you've got a computer, and you get online. You... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
The money being spent online is steadily growing. With billions... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Spyware protection software is the easiest way of removing spyware... Read More
You can detect spyware online using free spyware cleaners and... Read More
There are several basic concepts to keep in mind when... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
It has been said that with the wealth of information,... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
If you use emails actively in your communication, you must... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Imagine my surprise when I received a phone call from... Read More
A new variation of the Nigerian Scam theme ... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Internet Security |