Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very easy to understand the definition of 'Phishing'. Just replace letter 'F' from the word Fishing with 'Ph'. Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers.

Phishing & Spoof Web sites

The role of hacker is to lure the innocent Netizens by sending an e-mail from spoof sites, pseudo claiming to be an legitimate enterprise in an attempt to force the user into surrendering private information such as password, credit card number, and social security number etc; which will be used for identity theft.

The hyperlink in the e-mail directs the innocent user to a spoof Web site where they are asked to enter personal information like passwords, social security, and bank account numbers. Basically hackers create Spoof Web sites to steal the user's personal information.

The Idea Behind Spoof Sites

I can give you the well-known example in which users received Spam e-mails from hackers misleading innocent users. As if these mails came from eBay, claiming that the user's account was about to be suspended unless he clicked on the hyperlink in the e-mail and update the credit card information hold by the genuine eBay web site. The idea behind this scam is very simple as it is relatively simple to make a Web site look like a legitimate site. That is why the Phishing is also called brand spoofing.

Tips To Stop Phishing & Report Phishing

* If you smell anything fishy (phishy) or if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Simply delete such e-mail and make it thumb rule... never click that hyperlink in the e-mail.

* Contact your bank or financial institution on phone and confirm whether it has sent you such type of e-mail.

* Report Phishing to Federal Trade Commission (FTC).

* Send Internet Phishing scam reports to local authorities like police and crime bureau.

* Send details of a Phishing scam to the Anti-Phishing Working Group (APWG) to help them to build database of Phishing scams, and to alert the Netizens.

* Last but not the least if you can't afford to neglect or you are tempted to think that the hyperlink in the received e-mail is worth to click... take a deep breath, think twice before clicking that suspicious hyperlink and copy and paste the URL (hyperlink) into the web browser's address field and log on. This will help you to land on legitimate Web site instead of spoof Web site.

Popular Targets Of Phishers

1) Banks & Financial Institutions.

2) Credit card companies.

3) Auction portals.

4) Online stores.

5) Online stock trading companies.

How To Smell Phishing?

It is very difficult for e-mail recipients to guess what they have in their mailbox. They can't guess Whether it is legitimate e-mail from an organization With whom they do transactions. Although the "From" Field of the e-mail may have the web site address of That organization, and the hyperlink may also appear, If the sender insists on clicking that hyperlink and Unfortunately you click that hyperlink you will land To a spoof Web site. To avoid this situation you must Have that sense to smell something fishy (phi shy) Because any legitimate web site never ask you to Update your personal information simply by sending a Hyperlink through the e-mail, use your commonsense and Ask yourself a simple question, why the legitimate web Site would ask you to update your personal information through a hyperlink via e-mail, since that organization has its own legitimate web site? I hope you have got the answer.

Krishna Pai is a webmaster and a writer. Get Internet Security tips, Computer Tutorials, reviews, Hardware & Software Tips, How to guides at

http://www.cheapest-computer-hardware-sof tware.com/

For more Computer tips join his "Build Computer ezine" at http://www.cheap est-computer-hardware-software.com/build_computer_ezine.html

In The News:


pen paper and inkwell


cat break through


5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More