Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. The site will instruct you to enter personal information, such as your account ID, your password, your credit or debit card number and PIN, or your social security number. The criminals are "phishing" for information.

Tips for Spotting a Phishing Scam:

A fraudulent email will usually have a sense of urgency, stating that you must respond immediately or your account will be closed or frozen. Also, fraudulent emails and websites will often have obvious spelling errors.

Fraudulent emails will contain links to websites that appear to have an address similar to a Bank or its website name. Remember, it is always safer to type in the website address yourself than to click on a link.

It can be very difficult to determine the true identity of a website based upon its address. Cyber-criminals may use programming tricks to make the address that you see appear different than the true address to which you are directed.

Your greatest protection against online fraud is not to fall victim by taking reasonable steps to protect your private information. Visit the Federal Trade Commission's website at www.FTC.gov/idtheft for more information about online security and how to protect yourself from scams.

1. First and foremost, never provide personal information in response to an unsolicited email.

"ThreatconYellow.com (http://www.threatconyellow.com) will never send you an email in which we ask you to reveal your password or any other private information."

2. Never click on links in unsolicited emails.

If you receive an unsolicited email that appears to be from your bank, go directly to one of your banks websites by typing in the whole Internet address. If a legitimate alert were issued, you should be able to find that information on the website.

If you think that you may have revealed information to someone not legitimately connected your Bank:

1. Contact your Bank immediately!

2. If possible, forward the fraudulent email to the Bank without changing the subject line, and then delete it from your inbox.

When banking online, change your password frequently ? At least every 90 days, but you may change it more frequently if you are concerned that your account information might have been compromised.

(http://www.threatconyellow.com/phishing.htm)

Join the War on Crime: Get updated "Amber Alerts" at ThreatconYellow.com.

Get free "Consumer Advisory Alerts". Join the ThreatconYellow.com "Opt-out" mailing list at (http://www.threatconyellow.com). ThreatConYellow.com is one of the Internet's leading resources for self defense weapons, pepper sprays, stun guns, and home safety and protection products.

In The News:


pen paper and inkwell


cat break through


What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More