![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Cyber Crooks Go Phishing
"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish. But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse. "Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more. Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet. Here's the basic pattern for a "phishing" scam... You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity. In the email it tells you that something bad is about to happen unless you act quickly. Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name. In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up. Once you give up your information... it's all over but the crying! After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse. An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers. In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal. They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it. Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account. This new "phishing" style scam works extremely well for 2 basic reasons. First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking. Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional frenzy. The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense. Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox. If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think! Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling. Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it. Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com). Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate. Above all remember this: Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information. They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details. About The Author Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links... Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.TurnWordsIntoTraffic.com
MORE RESOURCES: Should iPhone users use security keys and Advanced Data Protection? The Washington Post Ukraine preparing for major escalation by Russia, top Ukrainian security official tells Sky News Sky News CISA establishes new office to ‘operationalize’ supply chain security Federal News Network Security Is Key to Maximizing Cloud Adoption Success in Healthcare HealthITSecurity Why Traditional Approaches Don’t Work for API Security Security Boulevard LA-based Embedded Ventures launches inaugural fund, with focus on national security and space tech CNBC Pakistan bombing raises fears over security breach, 100 dead The Associated Press - en Español 2 security guards shot, 1 fatally, at San Bernardino County party KTLA Los Angeles Nicholas Kathmann named LogicGate Chief Information Security ... Security Magazine Security officers coming back to East Lansing High School, other ... Lansing State Journal Data Privacy and the Journey of Smarter Security | Spiceworks News and Insights How to Set Up Security Keys for Apple ID on Your iPhone The Mac Observer Smuggler tells U.S. jury he paid off ex-Mexico security chief Los Angeles Times USENIX Security ’22 – Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu – ‘ Rol... Security Boulevard National Association of Counties and Election Security Government Technology Africa and the global LNG crunch: Balancing energy security ... Atlantic Council Nigeria Security Tracker Weekly Update: January 21-27 Council on Foreign Relations Case May Impact Role of Lawyers in Data Breaches and IR Security Boulevard IRS Income-Tax Investigations Threaten Taxpayer Security National Review U.S. military poised to secure new access to key Philippine bases The Washington Post $1M of funding announced for protection of non-profits PAHomePage.com Column: Ukraine's fight benefits U.S. national security. The House GOP is on the wrong side Yahoo News The Top SaaS Security Risks and Concerns to be Aware of Security Boulevard School where boy shot teacher reopens with added security The Associated Press - en Español AITX and Robotic Assistance Devices Announces Price Changes for Some Security Robots - Yahoo Finance Russian APT groups continue attacks with wipers and ransomware Security Magazine Google’s open source team layoffs: Your software supply chain security is at risk Security Boulevard Fort Worth Zoo increases security in wake of animal disappearances, death in Dallas Fort Worth Star-Telegram Abbas assures US security ties with Israel only partially cut, can be restored - The Times of Israel Abbas assures US security ties with Israel only partially cut, can be restored The Times of Israel Homeland Security issues warning about rise in sextortion cases UpNorthLive.com Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Is the UK the Security Leader Europe Needs? The National Interest Online The Definitive Browser Security Checklist The Hacker News New safety protocols for Northeastern's Oakland campus Security Magazine How Schools Have Boosted Security as Shootings Become More Common The New York Times More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security At Marine Raiders' homicide trial, questions center on security video Marine Corps Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post Remarks by President Biden on Border Security and Enforcement The White House |
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. HackAttack P C. owners are constantly at risk from attacks by hackers. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. ![]() |
home | site map |
© 2006 |