Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a link that I can follow in order to fill out an online form confirming my identity. It's certainly nice that Bank of the West is worried about the status of my account. There's just one problem ? I don't have an account at Bank of the West. In fact, I've never even heard of Bank of the West.

This message is an example of "phishing", a relatively new problem found on the Internet. Unscrupulous individuals are sending spam e-mail messages by the millions, purporting to be from credit card companies, PayPal, eBay, or banks. Each message warns the recipient of questionable activity on his or her account, as asks that the recipient click on a link to verify personal information. The requested information is usually a username or password. Sometimes it's a credit card number and expiration date. These messages are almost always fraudulent, and consumers are falling for them by the thousands. The messages certainly look legitimate, and often mimic the style of the legitimate company's messages exactly. How can you tell the difference between a real message from your bank and a fake one designed to steal your identity?

There are several tips to help identify phishing expeditions. The first is the greeting. "Dear valued customer" is an odd greeting from a company that has a database that contains your name, address, Social Security number and credit card. Any company with whom you do business that legitimately wants to contact you will probably do so by name. Look for misspelled words. Phishing expeditions often come from foreign senders who often mangle the English text of the message rather badly, combining both bad grammar and bad spelling. Check the links in the messages. The link may say www.eBay.com, but if you move your mouse over the link, you may see something like "htttp://200.118.105?" on the bottom line of your e-mail program, indicating that the link is a fake. Should you click on the link, you'll be taken to a page that looks just like the real Website, but why take the chance?

If you need to contact your bank, credit card company, or online auction house, either go to their Website directly or call them. Never click on a link in a message that threatens you with account suspension; if a company with whom you do business has issues with your account, they will probably contact you by phone or mail. These individuals who use these phishing tips are getting more clever all the time. It pays to be suspicious. If you aren't, you may end up a victim of identity theft.

©Copyright 2005 by Retro Marketing. Charles Essmeier is the owner of Retro Marketing, a firm devoted to informational Websites, including End-Your-Debt.com, a site devoted to debt consolidation and credit counseling, and HomeEquityHelp.com, a site devoted to information regarding home equity lending.

In The News:


pen paper and inkwell


cat break through


Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More