Be Aware of Phishing Scams!
If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.S. Bank Corporation that I received contains the subject "U.S. Bank Fraud Verification Process" and in the body of the mail it says "We recently reviewed your account, and suspect that your U.S. Bank Internet Banking account may have been accessed by an unauthorized third party. Protecting the security of your account and of the U.S. Bank network is our primary concern. Therefore, as a preventative measure, we have temporarily limited access to sensitive account features. To restore your account access, please take the following steps to ensure that your account has not been compromised:". It continues with a link to a webpage, which looks very similar to original web page of the bank.
The misleading web site appears authentic with familiar graphics and logos. The wordings are professional right down to the legal disclaimer at the bottom of the page.
If you happened to be holding an account of the claimed bank, followed the instructions of the email and input your account, pin, password, etc. you are doomed. You just have handed over access to your account to a con artist, who, in a matter of days, will drain off all the money available in that account.
This new scam, which is proliferating in a very rapid pace, is called "Phishing". Phishing is a form of identity theft, where a con artist with the help of official looking email containing link to phony web pages capable of harvesting information, tricks an unsuspecting victim into divulging sensitive personal data. Scammers use these data to bilk victims out of their savings.
One of the most common phishing campaigns being waged has targeted users of Web auction giant eBay and its PayPal division with financial services giant Citibank serving as another popular target. However, recently, every major bank has been hit with this scam. Crooks send out huge amounts of emails with an expectation that some of these email address owners may have online access to their accounts at the bank.
The term "Phishing" is a deviation of the word "Fishing". In hackers' lexicon, in many words, "F" becomes "Ph". The term derives from the fact that scammers use sophisticated bait as they "fish" for users' personal information.
According to Gartner, a research firm, illegal access to checking accounts gained via phishing has become into the fastest growing type of consumer theft in the United States. Roughly 1.98 million people reported that their checking account was breached in one way or another during the last year and US$ 2.4 billion were defrauded from the victims!
Gartner also estimated that 57 million U.S. Internet users have received phishing emails and 3 percent of them may have fooled into revealing their personal sensitive information.
The Anti-Phishing Working Group has also spotted a dramatic increase in reports of phishing attacks in recent months. Since November, 2003 phishing scams increase by about 110 percent each month. In April alone, the group identified 1125 unique phishing scams, a sharp lift of 178 percent from the previous month.
MessageLabs, a company that watches phishing scams closely, has noted an even more dramatic increase in number of phishing emails. It claims to see phishing messages jump from just 279 in September, 2003 to a staggering 215,643 in March of 2004.
The scammers also started to use more sophisticated technologies in recent months. The latest generation of phishing scammers uses several methods to trick users, including pop-up graphics to mast the true web URL of the phishing site and the installation of Spywares and Trojans on victim's computer. The perpetrators also take advantage of security bugs in web browsers, in which the URL in the address bar appears to be for one site but is, in fact, a link to a totally different site.
A new Windows worm under the name "Korgo" is able to infiltrate into victim's system with a key logging Trojan, steal information that the victim input in web forms and secretly transmit to designated server. There are a number of variants of this worm and they are spreading rapidly. However, Microsoft in April came up with a patch to seal this glitch. Many computers without the patch are still vulnerable to this potentially dangerous worm.
A U.S. Treasury report provides consumers with steps to prevent and report phishing scams:
Other cautionary measures you should take in order to protect yourself are:
About The Author
Nowshade Kabir is the founder, primary developer and present CEO of
Turkey slams West for security warnings 'harming' tourism The Associated Press - en Español
Turkey summons ambassadors of nine countries over security alerts The Jerusalem Post
I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home - CBS Boston
I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home CBS Boston
Should iPhone users use security keys and Advanced Data Protection? The Washington Post
US pushing Abbas on plan to boost PA security presence in northern West Bank The Times of Israel
Air Force sees national security threat in Chinese-owned corn mill Successful Farming
Dallas Zoo making 'significant changes' to security FOX 4 News Dallas-Fort Worth
CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection
Security Principles: Addressing underlying causes of risk in complex ... - Federal Trade Commission News
Security Principles: Addressing underlying causes of risk in complex ... Federal Trade Commission News
Redbot Security Promotes Keith Cox to Principal Security Engineer Kansas City Star
US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security
FTC approves order requiring Chegg to tighten data security Higher Ed Dive
Is There Liability from In-Home Security Monitoring? Security Sales & Integration
AI, Processor Advances Will Improve Application Security Security Boulevard
Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts
LAX power outage halts security screening, delays flights and traps ... Los Angeles Times
The WordPress Security Guide To Keep Your Site Safe Search Engine Journal
Holland & Knight Data Privacy and Security Report: January 2023 ... Holland & Knight
TikTok's Transparency Campaign Echoes Effort by Huawei to Ease ... The Wall Street Journal
ImagineIF Libraries Adds Security Presence to Kalispell Branch Flathead Beacon
Security increased at State Farm Stadium ahead of Super Bowl LVII WDAF FOX4 Kansas City
Keep Your Home Safe and Secure Consumer Reports
Explainer-Why U.S. Seeks Closer Security Cooperation With the ... U.S. News & World Report
Don’t Let API Leaks Sink Your Ship | API Security Newsletter Security Boulevard
WTO Reform Should Include Clarification of National Security ... Sandler, Travis & Rosenberg, PA
Gigamon Appoints Chaim Mazal Chief Security Officer Business Wire
Is It Time to Start Worrying About Quantum Computing Security? InformationWeek
Need an Insurance Policy Against Ransomware Attacks? Get Silverfort’s Free Identity Security Assessment - Security Boulevard
Need an Insurance Policy Against Ransomware Attacks? Get Silverfort’s Free Identity Security Assessment Security Boulevard
New DEG website boasts enhanced security measures, advanced ... Repairer Driven News
The best smart home security systems of 2023 Popular Science
The Week in Security: Russia takes aim at Ukraine with Sandworm, the truth about Russia’s top search ... - Security Boulevard
The Week in Security: Russia takes aim at Ukraine with Sandworm, the truth about Russia’s top search ... Security Boulevard
How to effectively communicate cybersecurity best practices to staff Security Magazine
How Bad Are System Failures and Security Incidents? The New Stack
Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose - KABC-TV
Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose KABC-TV
‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened - Fresno Bee
‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened Fresno Bee
The forgotten Black woman who invented the video home security ... The Washington Post
Lazarus Group Attack Identified After Operational Security Fail Infosecurity Magazine
Fire fatalities in decline according to Indiana Dept. of Homeland Security data - MyWabashValley.com
How Will ChatGPT Impact Web2, Web3 and Online Security? Spiceworks News and Insights
Monmouth basketball coach King Rice says job security not a ... Asbury Park Press
Vanta Names Security Leader David Eckstein as CFO Business Wire
CCS security team looking for solutions after 8th gun found in school since September - ABC6OnYourSide.com
CCS security team looking for solutions after 8th gun found in school since September ABC6OnYourSide.com
Expected Security Measures for Businesses in 2023 The National Law Review
Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security
Biden Administration Announces Additional Security Assistance for ... Department of Defense
DHS Announces Process Enhancements for Supporting Labor ... Homeland Security
DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security
How To Clean the Spies In Your Computer?
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001.
Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge
Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT.
Firewall Protection - Does Your Firewall Do This?
The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution.
DOS Attacks: Instigation and Mitigation
During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website.
How Free Scripts Can Create Security Problems
With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards.
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes.
How to Get Rid of New Sobig.F Virus?
As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.
The Attack of the Advertiser - Spy Mother Spy
The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems.
Personal Firewalls for Home Users
What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network.
Blogs as Safe Haven for Cybercriminals?
To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs.
SCAMS - Be Aware - And Report When Necessary
The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run.
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware.
Is That Free Stuff Like An iPod Or Desktop Computer Really Free?
Have you seen the web site, www.freestuff.
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
Don't Become An Identity Fraud Statistic!
"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call.
3 Things You Must Know About Spyware
1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now.
Data Security; Are Your Company Assets Really Secure?
Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today.
What to Look for before You Purchase Spyware Software
Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days.
Crack The Code - Thats A Direct Challenge
I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network.
Dont Miss Information Because of Misinformation
It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet.
|home | site map|