Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. What I am talking about here is not going after your ordinary, everyday catch. Yet a fine catch it indeed may be to those thieving bandits if they can lure you into giving up your personal and private information. Trickery is vast and common on the World Wide Web. Beware, I say, beware!
Email schemes, called "phishing" or "carding", attempt to trick consumers into disclosing personal and/or financial information. The emails appear to come from legitimate companies with whom consumers may regularly conduct business. I have seen scams appear to come from such noteworthy corporation as AOL, Earthlink, Paypal, eBay, or major credit card issuers. Often times the email threatens termination of accounts unless consumers update billing information.
Phishing comes around in all forms. How many of you have had some Nigerian Prince that just inherited 35 million US dollars offer to share it with you for one reason or another? How many of you have received an e-mail supposedly from your bank that for "security reasons" requests you to click a link that takes you to an online form to fill out, requesting all your personal and confidential information about your bank account?
A word to the wise: there is no Prince in Nigeria that needs your help, and your bank will never ask you for that info in an e-mail!
The latest Internet scam appears to come from the South African Department of Mining. "Resources and we are in dire need of a foreign partner to assist us in the receipt and investment of US$15,500,000.00?" All they request is a secure place to deposit the lump sum on US territory, and you will gain a large piece of the pie. WOW, what a deal!
Another I received comes from Johnson Mgabe, the son of the leader of the Republic of Zimbabwe Agricultural Commission. His father has just been assassinated, and he, the only remaining heir, is trying to escape. If you help him, he will give you lots of dough! Right on! "Please e-mail and tell me of your decision. I am ready to pay you 25% of the money [$45.5 Million] for your help, 5% shall go for expenses you might incur during the transaction. The remainder [70%] shall be mine."
Ok, ok, I am convinced; here is my private bank account, my SSN, DL# and address. Please tell me what I need to do next. Are they for real? Seriously though, if people didn't fall for these types of stunts, there wouldn't be so many floating around. Identity theft has become more and more rampant in this techno traveling world.
Again I say, beware.
Many of these email schemes contain links to "look-alike" websites that are loaded with actual trademarked images. The websites then instruct consumers to "reenter" their credit card numbers, social security numbers, bank PINs, or other personal information. If consumers actually provide the information requested, the data goes to scammers, not the legitimate company whose name is on the site. Thereafter, the data is often used to order goods or services and/or to obtain credit in the name of the consumer and potentially, steal your identity.
Again, I say, beware!
Rule for the road:
If you receive a precarious e-mail asking you for personal information, chances are it is a scam. It is better to be safe than sorry.
By Greg Richburg
Netricks, Inc.
All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com.
Greg Richburg is a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. a network consulting, web design and hosting company located in Fresno, CA.
Visit Netricks at http://www.netricks.com Richburg also runs KlickCommerce, anInternet based marketing system for Ujena brand clothing. See http://www.klickcommerce.com for details.
More of Richburg's work may be seen at http://www.valley411.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Never before with Instant Messaging (IM) has a more vital... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
In today's times spyware is a very serious issue and... Read More
There is no doubt that "how-to articles" have become a... Read More
Computer security for most can be described in 2 words,... Read More
When it comes to reporting Internet scams most of us... Read More
First the basic definition of Spyware: It is a type... Read More
Spyware protection software is the easiest way of removing spyware... Read More
The Threat10 years ago you could probably have run no... Read More
Having a good Spyware eliminator on your computer is vital... Read More
First of all we need to get some terms stated.... Read More
If you are a parent, as am I, I think... Read More
With the Internet entering our lives in such an explosive... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
We all know that it's dangerous to use the same... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
A couple of days ago, I was searching for a... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
If you constantly deal with bank or electronic accounts, it... Read More
If you run any type of Internet business, Adware and... Read More
When surfing the Internet you probably take your anonymity for... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
There are folks out there who use their powers for... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Identity Theft is one of the most serious problems facing... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
The 1998 Data Protection Act was not an extension to,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
A week or so ago, I received an inquiry from... Read More
There is no doubt that "how-to articles" have become a... Read More
Can you protect your computer from all possible viruses and... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
If you know what is the 'Fishing' then it's very... Read More
In today's times spyware is a very serious issue and... Read More
Well, if that would have been said to me by... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
A friend called me one day and asked if I... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Every now and then you can read about a new... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
In a word, no - an email message has always... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Spyware is the most troublesome software to appear on the... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Long gone are the days that we could feel secure... Read More
Imagine this ? you open up your email box and... Read More
There you are busily typing away on your PC or... Read More
The first thing people think about when defending their computers... Read More
Today the internet is a mine field of malicious code... Read More
Every single time you access a website, you leave tracks.... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Computer infections can be broken up into 4 main categories... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Internet Security |