![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Phishing - Its Signs and Your Options
Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. I hope to give you enough examples and information to help you to safeguard yourself from these unsavory individuals. In addition, sometimes the email is sent to malicious software so as to render your computer helpless. Thus, it is important that you do not click on the link they provide, because that is the trigger that will load the software to your system. EXAMPLES OF PHISHING You receive hundreds of emails in your mailbox, but one email catches your eye - it directs you to a website, requesting that you need to update your personal information. It requests such personal information as: passwords "It appears to be legitimate", you say to yourself. And you also notice that the emails are from companies that you have been doing business with for a while. Warning: The website could be bogus. Here are several examples of phishing in action. 1. E-mails stating they are from E-bay and they feel that your account may have been compromised and would like you to verify your information with they so conveniently supply. DO NOT click on it. 2. E-mails from Paypal or your bank asking that you verify your information because they feel that your account has been compromised, or heaven forbid, suspended. Same scenario, different company. DO NOT click on the link. 3. E-mail that states that an unauthorized transaction has occurred on your account. Please click the link below and confirm your identity. DO NOT. 4. Here's a work at home scam - We have seen your resume on Monster and feel you would fit our position. If you are interested, please go to our website, look over the experience required and submit your resume if you have this background. Website is professional looking, offer looks good - but it could be a scam. WHAT ARE THEY AFTER In the above examples they are after information about you, be it passwords, credit cards, social security numbers, anything that can identify you - and that which they can use to profit from you. The job email is used to verify that the email address is a true blue, active email address. What do they do with this info - they sell these accounts to spammers for good money. They need to verify your email address-because if the spammers come up empty - this person's business is dead. HOW TO VERIFY SAFELY 1. If they want you to verify your account, do not cut and paste, or use the link they provide in the email. Close your Internet session, open a new session and enter the site that you have on record to verify. 2. Emails requesting resumes - Verify their account before you send your resume. When verifying - these red flags should be considered: 1) If they are hesitant to provide a phone number - might be a scam. 2) If their business address is not verifiable -might be a scam. 3) If the website is new - might be a scam. 4) If they use a large company's name-and that company never heard of them - might be a scam.5) Again, verify this information before you send your resume. WAYS TO PROTECT YOURSELF Here are some quick tips to protect you and your computer system. 1. Use anti-virus software and a firewall - keep them up to date. 2. If you have a broadband connection make sure you have a firewall in place. 3. Don't email personal or financial information. 4. Before providing personal information - search to see if the site is secure - look for a lock icon. However, remember not all phishers are stupid - in fact, they could be computer savvy enough to forge security icons. Thus, look for a site whose link looks like this: https://www.somename.com -- this shows that it is a secure site. 5. Coupons from respected companies - Verify that it is a true-blue coupon from the company - I had one coupon sent to my email address from what I thought was Staples. Verified it with Staples - not a coupon honored by Staples. When on the Internet - if it looks like a duck, quacks like a duck, it still may not be a duck! 6. When making transactions on the Internet - be it online banking, Paypal, Internet Gold, etc. - complete your transaction, log out of the website, and close out of your Internet Explorer-and then continue with a new session of Internet Explorer. WHERE TO FORWARD SPAM THAT IS PHISHNG If you encounter spam that is phishing, or are a victim of a phishing scam, you can forward the information to spam@uce.gov and to the company, bank or organization that the email may have stated they are from. In many cases, the other organizations have information on their website where you can report the attempted scam. In addition, if you have been scammed, and you wish to file a complaint - go to ftc.gov. To conclude, no one is immune to spam or a scam. But try to be ever vigilant and do your due diligence with anything you do on the Internet. But being human is a scammer's hope - they know that most will ignore the bait, but some will be tempted. So, if you so humanly slip, and succumb to a phishing scam, you can report them to ftc.gov. Vickie J Scanlon has a BBA degree in Administrative Management and Marketing. Visit her site at: http://www.myaffiliateplace.biz for free tools, articles, ebooks, how to info, affiliate opportunities, products and services - to meet your budget and needs.
MORE RESOURCES: Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones The Wall Street Journal Tallahassee Memorial Healthcare provides update on IT security issue WTXL ABC 27 Tallahassee News Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat Montana bill addresses security and foreign ownership of land KRTV NEWS Great Falls Butler County public, private schools get more money for security upgrades Hamilton Journal News Why 2023 is the time to consider security automation The Enterprisers Project Move surveillance to a proactive security strategy with video analytics Security Magazine President Biden Announces Appointments to the President’s ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense Just How Early Can Departing Passengers Access Security? Simple Flying Texas Senate leaders signal intent to spend big on border security The Texas Tribune CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection Trends that impact on organizations' 2023 security priorities Help Net Security Deputy Secretary Sherman's Meeting with Poland's National ... US Embassy and Consulate in Poland SaaS in the Real World: Who's Responsible to Secure this Data? The Hacker News Finland's Most-Wanted Hacker Nabbed in France – Krebs on Security Krebs on Security Schuylkill County fans work security for Super Bowl WNEP Scranton/Wilkes-Barre Cequence Increases the Lead in Unified API Protection Security Boulevard Just 49% of organizations have funds for current cybersecurity needs Security Magazine Tilapia Genome Provides Boost to Global Food Security Technology Networks Yet More ImageMagick Vulnerabilities Security Boulevard Iran’s Security Forces Continue Arresting Journalists ایران اینترنشنال Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security DHS Announces Process Enhancements for Supporting Labor ... Homeland Security Security guard accused of killing man during fight at grocery store will not face charges Fox Baltimore U.S. military poised to secure new access to key Philippine bases The Washington Post House Republicans Preparing Broad Inquiry Into F.B.I. and Security Agencies The New York Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post Git patches two critical remote code execution security flaws BleepingComputer Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security MSI breaks Secure Boot for hundreds of motherboards BleepingComputer Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer Liz Weston: 'Bridge' your way to Social Security The Washington Post PayPal accounts breached in large-scale credential stuffing attack BleepingComputer Galaxy Note 20 gets first dibs on February 2023 security update SamMobile - Samsung news |
![]() |
![]() |
![]() |
RELATED ARTICLES
Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. ![]() |
home | site map |
© 2006 |