So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. They make people surrender their passwords and account numbers ? and afterwards they clear their accounts.
This is a peril for internet merchants, affiliates and webmasters, because they often display email addresses on websites, ads or articles. Phishers may pick easily addresses from these sources.
Phishers try to worry you!
They write you stories as follows:
There have been unusual transactions on your account.
Your account is going to be suspended soon, because it lacks validation.
The database crashed down and has to be restored.
They have lost some email addresses and they need to update their database.
A case has been reported how they try to dupe the internet users. The g has been replaced with a q in the URL of citigroup. Thus the URL www.citigroup.com has been altered in www.citiqroup.com
They urge users to act immediately
The next step is that they urge their victims to act. They offer a link to a website, where people can type in their confidential information. If the people submit the demanded information, they open unvoluntarily the doors to a modern kind of thieves. The accounts of the victims can be looted within a few minutes.
How to protect your money?
Be aware: The serious and well known financial service companies never ask people by email for confidential information. I cite from an email by PayPal that I have received after reporting an ominous email to them: "PayPal and its representatives will NEVER ask you to reveal your password. There are NO EXCEPTIONS to this policy. If anyone claiming to work for PayPal asks for your password under any circumstances, by email or by phone, please refuse and immediately contact us via webform.."
This is the most important rule to protect your account!
Other financial services follow a policy similar to PayPal.
People may report to the financial services unusual emails. The more they know about such incidents, the better they can track them in order to find out some patterns about the abusers.
If the people feel uneasy about their accounts, they can check them through the web browser. They should type in manually the website address of the financial service into their browser. They can check matters there safely. But they never may type their confidential information in a form that has been sent by email!
It's recommendable to change the password of electronic accounts from time to time.
By the way: I do not use my email address of the Pay Pal Account in any public statements. I use different email addresses there.
The origin of the word Phishing
The new internet term Phishing origins probably from the word Fishing. Phishing has been extracted from the word combination "password harvesting fishing".
Further background information
More background information about actual kinds of abuse is available at the website www.scambusters.org It's worthwhile to have a look what is going on in the world wide web.
Lil Waldner is a business economist. She is experienced in project management and marketing. She has worked as editor of newspapers and she has written booklets and essays with economic and public issues. Visit her web site: AGM Home Business
![]() |
|
![]() |
|
![]() |
|
![]() |
To blog or not to blog? Well, why not? Lots... Read More
There you are busily typing away on your PC or... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Credit card fraud is a growing problem for online businesses... Read More
Imagine this ? you open up your email box and... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
My first experience with a spyware BHO based infection was... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Paypal is a great site and is used by many... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Security leaks can be a big problem for any site... Read More
The top five online scams on the Internet hit nearly... Read More
This is the second in a series of articles highlighting... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
The Internet is a vast International Network of people and... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Have you ever had to call Symantec or McAfee to... Read More
Can you protect your computer from all possible viruses and... Read More
Having a good Spyware eliminator on your computer is vital... Read More
With the advent of the World Wide Web, a whole... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
The Threat10 years ago you could probably have run no... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Despite the current wave of identity theft and corporate security... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Every day millions of people go online to find information,... Read More
There are several basic concepts to keep in mind when... Read More
As more people are logging onto the Internet everyday, Network... Read More
Whether we like it or not, we are all living... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Computer security for most can be described in 2 words,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Spyware is software or hardware installed on a computer without... Read More
If you know what is the 'Fishing' then it's very... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
When we think of adware, what comes to mind are... Read More
Working from home has its advantages, including no commute, a... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Phishing is the act of some individual sending an email... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
This is the second in a series of articles highlighting... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
If spyware were a person and he set himself up... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
A little bit of time invested into learning about internet... Read More
Millions of people make purchases online, but many people are... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Security leaks can be a big problem for any site... Read More
What is computer security? Computer security is the process of... Read More
The top five online scams on the Internet hit nearly... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
As soon as almost all computer users already got used... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Every day millions of people go online to find information,... Read More
Internet Security |