Phishing - Identity Theft & Credit Card Fraud

What is Phishing?
Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of social engineering, by posing as a different person or organization that you already trust.

How does Phishing Work?
The most common form of Phishing is done by sending out fraudulent e-mails, that lead back to websites that look legitimate. Normally an e-mail is sent to a huge amount of people stating in very general terms that you should come to their website and update your information, or provide them with some new information they need, or some other similar excuse. When you click on the link in the e-mail it will take you to a website that looks very similar to the one you are expecting, you enter your information, and now they've got you. Another method is to open a popup windows asking information, on top of the real legitimate website.

How can I identify a scam e-mail?
There are several major things to look out for that will lead you to believe the e-mail is fraudulent. Quite often the e-mails will be HTML based, not plain text, this allows them to put active links that display a legitimate website, but the coding behind it takes you to a different website.

Often new websites are registered with altered spellings of major corporations and organizations, or the link will lead directly to an IP address (ie 24.38.122.156) instead of a website domain (ie www.website.com).

Another very quick way to identify a false e-mail is to see who it is address to. Normally e-mails that are fraudulent in nature are addressed to "Dear Customer" as opposed to your real name, and often they are e-mailed to many users at one time.

No legitimate organization should ever ask you to provide you with personal information via e-mail. If any e-mail ever asks you to e-mail them your private information, you should report this e-mail to the company they are posing as.

How can I avoid falling for a Phishing scam?
If you believe the e-mail could be legitimate, don't click on the link in the e-mail, instead open up your web browser, and use the link/favorite you already have, or type in the website yourself in to the URL box. This will guarantee that you are using the correct legitimate website!

Using the same method to get to the website as mentioned above, go to the organizations help page or contact page and ask them about the e-mail they may have sent you. You can also forward them the e-mail to a known legitimate e-mail address at their organization.

What if I already fell for this scam?
If you have mistakenly been taken in by this kind of scam there is several very important steps you need to take. First, report that you have been tricked by this method to your credit card companies, and other financial institutions.

Report that you have been tricked to the company that you thought you were legitimately updating information for. If you can provide them with the e-mail that tricked you, it may be useful for helping to reduce the impact on other people around the world.

Change all your passwords and PIN numbers for all your financial institutions and websites immediately.

Monitor your credit card statements, financial slips and balances. If you notice a discrepancy, immediately contact your financial organization and let them know about the fraudulent activity. In addition most banks should be able to add you to a fraud report list that will stay on your credit report that will make it harder for people to create new credit cards or open accounts without providing legitimate identification in person. Finally, you should contact your local police or law enforcement organization and file an incident report to cover yourself should illegal activities happen!

Ken Dennis http://KenDennis-RSS.homeip.net/

In The News:


pen paper and inkwell


cat break through


Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More