Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. These crooks are hoping people that have an account with the business will click on the link and submit their account information for verification purposes. These thieves are phishing for account information. Phishing is a sophisticated way to lure you to phony websites where you voluntarily surrender your passwords and account information to identity thieves without realizing it.
These types of emails often threaten you. You must take action within a limited time or the consequences will be dire. Some AOL customers received a phishing email stating if they did not verify their account information within 24 hours, their service would be terminated. Other phishing emails will state your account has been flagged or has a problem and the account information needs to be verified. We received an email for Pay Pal that stated our account had been flagged and we needed to verify our account information. The identity thieve was lucky. We do have an account with Pay Pal. We open the email and it appeared to be an email from Pay Pal. We click on the link and it took us to https://www.paypal.ae.com. The site looked Pay Pal's website. The web page was asking for our account information for verification purposes. We knew right away it was a phony because our Pay Pal account was opened with another email address. This particular site has been shut down, but doesn't mean the identity thieve was caught. You could receive a phishing email from the same thieve tomorrow. What can you do to avoid such a trap?
First, realize reputable companies will never send you an email asking you to confirm your account information. The email will look authentic and this may cause you some concern. If this is the case, you can always call the company and ask about your account. An alternative to calling is checking your account online. Do not click on the link in the email. Log completely out of your email and open another window and type in the company's web address to verify your account.
You're probably thinking why would you want go to the trouble to close your email and open another browser window. The link in the email is a cloaked redirection link that will take you to another website that is not associated with the company. A cloak link will show you the correct web address when you move your mouse over it. If you do click on that link, the web address, or URL, will be similar to the company's address, but it will not match exactly. The website will look just like just like you expect it too look. The web page will ask for your account information. You're just one click away from submitting your account information to the identity thieve. We went to the actual Pay Pal website and, sure enough, our account was ok.
Identity thieve have been known to attach a file to a phishing email. The attachment contain a program to transmit your personal information on your hard drive to the identity thieve. You will never know the program has been installed on your computer. Never open an email attachment unless you specifically requested it and are expecting an email with an attachment. The phishing email may be from someone you know. His or her computer could be infected with a virus that sends email to everyone in his or her address book. Delete the emails with attachments without opening the email.
Finally, if you get an email that is phishing for your information, forward it to spam@uce.gov. If you know how open the email headers, cut and past that information into the email to help the FCC track down these identity thieves.
George Burks of http://www.mybiweeklymortgagepayment.com has offered a biweekly mortgage payment plan with no enrollment fees since 1999. His interest in financial topics is varied and includes identity protection. Please visit our financial library.
![]() |
|
![]() |
|
![]() |
|
![]() |
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Whether we like it or not, we are all living... Read More
The average computer is packed with hidden software that can... Read More
As the number of people using the Internet as an... Read More
First the basic definition of Spyware: It is a type... Read More
So you want to know who your kids are chatting... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
No longer are viruses the only threat on the internet.... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Millions of people make purchases online, but many people are... Read More
In recent days, I was one of the unfortunate persons... Read More
Before you enter your name, address or any other data... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
To blog or not to blog? Well, why not? Lots... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
You'd better learn news from media, not from emails, security... Read More
If you use the internet, you have probably been infected... Read More
The most frustrating part of having Spyware on your computer... Read More
This is not some new fangled techno-speak, it is a... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
When it comes to reporting Internet scams most of us... Read More
Every now and then you can read about a new... Read More
Today,on most internet user's computers, we have the ability to... Read More
You are at your computer, checking out software on EBay.... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
The words Corporate Security may conjure up images of a... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Well, if that would have been said to me by... Read More
A couple of years back, I paid my dues the... Read More
A couple of days ago, I was searching for a... Read More
A little bit of time invested into learning about internet... Read More
To blog or not to blog? Well, why not? Lots... Read More
Phishing is a relatively new form of online fraud that... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
There you are busily typing away on your PC or... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
What is computer security? Computer security is the process of... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
When it comes to a secure website and passwords it... Read More
As you know, this time the virus under the name... Read More
Can you protect your computer from all possible viruses and... Read More
The 1998 Data Protection Act was not an extension to,... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Imagine my surprise when I received a phone call from... Read More
The Internet is a vast International Network of people and... Read More
Fishing on the Internet has come a long way. However,... Read More
Ebay is a great site and is used by many... Read More
My first experience with a spyware BHO based infection was... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Long gone are the days that we could feel secure... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Sooner or later everyone with an email account will receive... Read More
Let us take the example of scrambling an egg. First,... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Spyware protection software is the easiest way of removing spyware... Read More
As the number of people using the Internet as an... Read More
Security leaks can be a big problem for any site... Read More
Internet Security |