Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very easy to understand the definition of 'Phishing'. Just replace letter 'F' from the word Fishing with 'Ph'. Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers.

Phishing & Spoof Web sites

The role of hacker is to lure the innocent Netizens by sending an e-mail from spoof sites, pseudo claiming to be an legitimate enterprise in an attempt to force the user into surrendering private information such as password, credit card number, and social security number etc; which will be used for identity theft.

The hyperlink in the e-mail directs the innocent user to a spoof Web site where they are asked to enter personal information like passwords, social security, and bank account numbers. Basically hackers create Spoof Web sites to steal the user's personal information.

The Idea Behind Spoof Sites

I can give you the well-known example in which users received Spam e-mails from hackers misleading innocent users. As if these mails came from eBay, claiming that the user's account was about to be suspended unless he clicked on the hyperlink in the e-mail and update the credit card information hold by the genuine eBay web site. The idea behind this scam is very simple as it is relatively simple to make a Web site look like a legitimate site. That is why the Phishing is also called brand spoofing.

Tips To Stop Phishing & Report Phishing

* If you smell anything fishy (phishy) or if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Simply delete such e-mail and make it thumb rule... never click that hyperlink in the e-mail.

* Contact your bank or financial institution on phone and confirm whether it has sent you such type of e-mail.

* Report Phishing to Federal Trade Commission (FTC).

* Send Internet Phishing scam reports to local authorities like police and crime bureau.

* Send details of a Phishing scam to the Anti-Phishing Working Group (APWG) to help them to build database of Phishing scams, and to alert the Netizens.

* Last but not the least if you can't afford to neglect or you are tempted to think that the hyperlink in the received e-mail is worth to click... take a deep breath, think twice before clicking that suspicious hyperlink and copy and paste the URL (hyperlink) into the web browser's address field and log on. This will help you to land on legitimate Web site instead of spoof Web site.

Popular Targets Of Phishers

1) Banks & Financial Institutions.

2) Credit card companies.

3) Auction portals.

4) Online stores.

5) Online stock trading companies.

How To Smell Phishing?

It is very difficult for e-mail recipients to guess what they have in their mailbox. They can't guess Whether it is legitimate e-mail from an organization With whom they do transactions. Although the "From" Field of the e-mail may have the web site address of That organization, and the hyperlink may also appear, If the sender insists on clicking that hyperlink and Unfortunately you click that hyperlink you will land To a spoof Web site. To avoid this situation you must Have that sense to smell something fishy (phi shy) Because any legitimate web site never ask you to Update your personal information simply by sending a Hyperlink through the e-mail, use your commonsense and Ask yourself a simple question, why the legitimate web Site would ask you to update your personal information through a hyperlink via e-mail, since that organization has its own legitimate web site? I hope you have got the answer.

Krishna Pai is a webmaster and a writer. Get Internet Security tips, Computer Tutorials, reviews, Hardware & Software Tips, How to guides at

http://www.cheapest-computer-hardware-sof tware.com/

For more Computer tips join his "Build Computer ezine" at http://www.cheap est-computer-hardware-software.com/build_computer_ezine.html

In The News:


pen paper and inkwell


cat break through


Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More