Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.
Despite the sad fact that about 5% of phishing attempts are successful for fraudsters, PC users are getting more cautious about bogus e-mails asking for personal and/or financial information.
As public awareness of phishing methods grows, phishers are inventing new tactics in an attempt to delude people.
Yet Another Phishing Scheme: Don't Fax Back, Please
On August 10, 2005 experts from SophosLabs warned us users about a new phishing trick. No bogus websites this time: phishers were trying to make people to send their credit card information? by fax.
The emails claim to be from Paypal, the payment system used by the popular Ebay auction website. They tell a user that a security breach has occurred - someone tried to reset his password. Rather clichéd, isn't it? Lots of phishers follow this pattern.
The difference is that no bogus online forms are involved. The email urges the user to download the form (Microsoft Word document), fill it and send by fax.
The online form is hosted on a Polish server. The fields to fill in include: credit card details used in the Paypal account (name on the credit card, its number, type, expiration date), as well as email address on Paypal account with password, post address and phone numbers.
With such a lot of personal identifying information it won't be difficult for a fraudster to pose as this person and commit a bunch of crimes, from cleaning all money from the account to setting deals under the victim's name.
One hasn't to be a genius to guess what people this scam is aimed at. Having heard and read about bogus phishing websites, users are getting suspicious about filling forms online. They might think that faxing personal details is safer -- and make a very costly mistake. Phishers take advantage of our carelessness and credulity.
eBay Scheme - Specially for Kind-Hearted
This scam is even more brazen, because it exploits people's generosity and kindness. Giving a helping hand to an elderly woman ? what can be more natural for any human being?
Emails come ostensibly from Greta, a wheelchair-bound woman of 89. This lady can't find a particular auction, so she "asks you for help".
When some Good Samaritan, willing to assist her, clicks the link in the email, he or she is directed to a bogus eBay site, then, unaware of the deceit, clicks the 'respond now' button and logs on. User names and passwords, obtained this way, most likely will be used to set up deals on eBay under names of other people.
The only way to prevent such scams is stop being credulous and careless. Don't uncritically believe everything you read about -- especially in emails from people you don't know personally.
Don't give out your personal information before verifying where it goes to and whether the claim is genuine.
Whatever the means of providing information -- phone, fax, snail mail or email -- if you hand out certain information, you lose it.
Spam remains one of the favorite tools for identity thieves of all stripes. Never responding, never clicking links within fraudulent spam messages, or, even better, deleting them straight away should become a habit, like washing hands or cleaning teeth.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. Its software effectively prevents keyloggers from stealing information. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc
Learn more -- visit the company's website http://www.anti-keyloggers.com
Airport Menace: The Wireless Peeping Tom As a network... Read More
Nobody wants to pay to remove spyware. At the very... Read More
If spyware were a person and he set himself up... Read More
The Message Must Get Through The year is 300A.D.,... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Shopping for horse gifts or other gift items on the... Read More
Over the past few years as the internet has become... Read More
Nowadays more and more people are using a computer. A... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Some months ago, before there was much publicity regarding phishing... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
As soon as almost all computer users already got used... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
A new variation of the Nigerian Scam theme ... Read More
Well, this is an article I never thought I would... Read More
When it comes to a secure website and passwords it... Read More
Phishing is the act of some individual sending an email... Read More
If you run any type of Internet business, Adware and... Read More
Before you enter your name, address or any other data... Read More
No longer are viruses the only threat on the internet.... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
First, let's do a little recap'. As I stated in... Read More
Long gone are the days that we could feel secure... Read More
With the advent of the World Wide Web, a whole... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
You've seen it in the news - 40 million credit... Read More
The top five online scams on the Internet hit nearly... Read More
My first experience with a spyware BHO based infection was... Read More
Spyware and adware are becoming major problems for online surfers... Read More
I am the victim of an internet scam. It is... Read More
Whether we like it or not, we are all living... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Ebay is a great site and is used by many... Read More
The Message Must Get Through The year is 300A.D.,... Read More
While clicking from site to site on the internet you... Read More
A couple of years back, I paid my dues the... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
In the past I've never really paid much attention to... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
When we think of adware, what comes to mind are... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Can you protect your computer from all possible viruses and... Read More
We all get the odd virus now and then, but... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
If you are wondering how to fight spyware for safe... Read More
As more people are logging onto the Internet everyday, Network... Read More
Only the top spyware removers are successful at detecting and... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Huge number of spyware software applications are available in the... Read More
First I would like to stress I am condoning the... Read More
Over the past few years as the internet has become... Read More
If you know what is the 'Fishing' then it's very... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
When surfing the Internet you probably take your anonymity for... Read More
If you use emails actively in your communication, you must... Read More
At this point, if you've got the whole "turning the... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Today,on most internet user's computers, we have the ability to... Read More
When the Internet first came about, it was realized it... Read More
Whether we like it or not, we are all living... Read More
Internet Security |