Phishing-Based Scams: A Couple of New Ones
Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.
Despite the sad fact that about 5% of phishing attempts are successful for fraudsters, PC users are getting more cautious about bogus e-mails asking for personal and/or financial information.
As public awareness of phishing methods grows, phishers are inventing new tactics in an attempt to delude people.
Yet Another Phishing Scheme: Don't Fax Back, Please
On August 10, 2005 experts from SophosLabs warned us users about a new phishing trick. No bogus websites this time: phishers were trying to make people to send their credit card information? by fax.
The emails claim to be from Paypal, the payment system used by the popular Ebay auction website. They tell a user that a security breach has occurred - someone tried to reset his password. Rather clichéd, isn't it? Lots of phishers follow this pattern.
The difference is that no bogus online forms are involved. The email urges the user to download the form (Microsoft Word document), fill it and send by fax.
The online form is hosted on a Polish server. The fields to fill in include: credit card details used in the Paypal account (name on the credit card, its number, type, expiration date), as well as email address on Paypal account with password, post address and phone numbers.
With such a lot of personal identifying information it won't be difficult for a fraudster to pose as this person and commit a bunch of crimes, from cleaning all money from the account to setting deals under the victim's name.
One hasn't to be a genius to guess what people this scam is aimed at. Having heard and read about bogus phishing websites, users are getting suspicious about filling forms online. They might think that faxing personal details is safer -- and make a very costly mistake. Phishers take advantage of our carelessness and credulity.
eBay Scheme - Specially for Kind-Hearted
This scam is even more brazen, because it exploits people's generosity and kindness. Giving a helping hand to an elderly woman - what can be more natural for any human being?
Emails come ostensibly from Greta, a wheelchair-bound woman of 89. This lady can't find a particular auction, so she "asks you for help".
When some Good Samaritan, willing to assist her, clicks the link in the email, he or she is directed to a bogus eBay site, then, unaware of the deceit, clicks the 'respond now' button and logs on. User names and passwords, obtained this way, most likely will be used to set up deals on eBay under names of other people.
The only way to prevent such scams is stop being credulous and careless. Don't uncritically believe everything you read about -- especially in emails from people you don't know personally.
Don't give out your personal information before verifying where it goes to and whether the claim is genuine.
Whatever the means of providing information -- phone, fax, snail mail or email -- if you hand out certain information, you lose it.
Spam remains one of the favorite tools for identity thieves of all stripes. Never responding, never clicking links within fraudulent spam messages, or, even better, deleting them straight away should become a habit, like washing hands or cleaning teeth.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. Its software effectively prevents keyloggers from stealing information. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc
Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
Seven Nations Meet to Address Space Security > U.S. Department of Defense > Release - Department of Defense
Seven Nations Meet to Address Space Security > U.S. Department of Defense > Release Department of Defense
3 Ways Attackers Bypass Cloud Security DARKReading
Reports: Many security lapses led to Texas inmate's escape The Seattle Times
Chairman Thompson Lauds Homeland Security Provisions in NDAA, Including Measures to Protect Houses of Worship, Bolster Nation's Cybersecurity - House Homeland Security Committee
Chairman Thompson Lauds Homeland Security Provisions in NDAA, Including Measures to Protect Houses of Worship, Bolster Nation's Cybersecurity House Homeland Security Committee
U.S. and Morocco Co-Host Proliferation Security Initiative Workshop - United States Department of State - Department of State
U.S. and Morocco Co-Host Proliferation Security Initiative Workshop - United States Department of State Department of State
Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance - DARKReading
Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance DARKReading
Rep. Sherrill Secures Inclusion of Daniel Anderl Judicial Security and Privacy Act in the Final Version of the NDAA - Mikie Sherrill
Rep. Sherrill Secures Inclusion of Daniel Anderl Judicial Security and Privacy Act in the Final Version of the NDAA Mikie Sherrill
Top security news of 2022 Security Magazine
National Security Space: Overview of Contracts for Commercial Satellite Imagery - Government Accountability Office
National Security Space: Overview of Contracts for Commercial Satellite Imagery Government Accountability Office
Clock Is Ticking for TikTok to Reach Security Deal With Washington The Wall Street Journal
OPSWAT MetaDefender Cloud Email Security protects users against zero-day threats - Help Net Security
The limitations of security organization benchmarking SecurityInfoWatch
The Week in Security: Software supply chain attack mines diamond industry, npm security boosted - Security Boulevard
The Week in Security: Software supply chain attack mines diamond industry, npm security boosted Security Boulevard
US-UK Energy Security and Affordability Partnership The White House
DHS Announces Extension of REAL ID Full Enforcement Deadline Homeland Security
Beyond Identity and Zscaler join forces to strengthen zero trust security strategies - Help Net Security
Beyond Identity and Zscaler join forces to strengthen zero trust security strategies Help Net Security
IAEA Mission to Sudan Finds Improved Nuclear Security Infrastructure, Encourages Strengthening of Nuclear Security Detection and Response | IAEA - International Atomic Energy Agency
IAEA Mission to Sudan Finds Improved Nuclear Security Infrastructure, Encourages Strengthening of Nuclear Security Detection and Response | IAEA International Atomic Energy Agency
Ex-FBI agent calls for more security at electric substations NewsNation Now
SpaceX begins partner project designed for national security GPS World magazine
Haney's bill would keep landlords from charging costly security deposits CBS San Francisco
Investigation finds Etna trustee logged into security camera system more than 100 times in a month - The Newark Advocate
Investigation finds Etna trustee logged into security camera system more than 100 times in a month The Newark Advocate
Will the U.S.-Africa Summit Address U.N. Security Council Reform? - United States Institute of Peace
Will the U.S.-Africa Summit Address U.N. Security Council Reform? United States Institute of Peace
Japan-U.S. Energy Security Dialogue Joint Statement US Embassy and Consulates in Japan
Under the Surface: How Microsoft Is Digging Deep into Security BizTech Magazine
PCI Secure Software Standard 1.2 released Help Net Security
'We are taking this very seriously': Downtown patrols and security increased after armed robberies Wednesday - The Spokesman Review
'We are taking this very seriously': Downtown patrols and security increased after armed robberies Wednesday The Spokesman Review
â€˜We wanted it to be very overt:â€™ Columbia Police installs 50+ security cameras throughout the city - WIS News 10
â€˜We wanted it to be very overt:â€™ Columbia Police installs 50+ security cameras throughout the city WIS News 10
Remarks by National Security Advisor Jake Sullivan at the International Anti-Corruption Conference (IACC) - The White House
Remarks by National Security Advisor Jake Sullivan at the International Anti-Corruption Conference (IACC) The White House
Department of Homeland Security Updates School Swatting Incidents - West Virginia Public Broadcasting
Department of Homeland Security Updates School Swatting Incidents West Virginia Public Broadcasting
Apple changes AirDrop security for all with iOS 16.2 after backlash over restrictions in China - TechCrunch
Apple changes AirDrop security for all with iOS 16.2 after backlash over restrictions in China TechCrunch
Ex-Trump advisor Flynn testifies amid heightened security The Atlanta Journal Constitution
Mobile Security Vendor Approov Hires New CEO to Expand in US BankInfoSecurity.com
Android December 2022 security updates fix 81 vulnerabilities BleepingComputer
Man shot by security guard, arrested after trespassing at Palmetto Bay car dealership - WPLG Local 10
Joe Kelly '83 to retire as Minnesota's director of Homeland Security and Emergency Management - CSB/SJU
Joe Kelly '83 to retire as Minnesota's director of Homeland Security and Emergency Management CSB/SJU
New Login Security Features for Multi-Factor Authentication App University of Arkansas Newswire
Chicago private school defends LGBTQ sex ed, tightens security after right-wing viral video - Chicago Sun-Times
Chicago private school defends LGBTQ sex ed, tightens security after right-wing viral video Chicago Sun-Times
Alleged killing of Texas girl by FedEx driver raises security concerns about shipping service - Fox News
Alleged killing of Texas girl by FedEx driver raises security concerns about shipping service Fox News
Security Council Press Statement on Sudan | UN Press United Nations
Chick-fil-A opening this month at Security Square Mall wmar2news.com
AOC wonâ€™t say if sheâ€™s still using TikTok amid national security concerns about China-owned platform - Fox News
AOC wonâ€™t say if sheâ€™s still using TikTok amid national security concerns about China-owned platform Fox News
Video: Security steps between Paddy Pimblett and Ilia Topuria at UFC 282 press conference during heated confrontation - Yahoo Sports
Video: Security steps between Paddy Pimblett and Ilia Topuria at UFC 282 press conference during heated confrontation Yahoo Sports
Energy Security Support to Ukraine - United States Department of State Department of State
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
TSA is adding face recognition at big airports. Hereâ€™s how to opt out. The Washington Post
FBI director raises national security concerns about TikTok The Associated Press
Iran Holds First Execution Over Anti-Regime Protests Washington Free Beacon
Rackspace rocked by â€˜security incidentâ€™ that has taken out hosted Exchange services - The Register
Rackspace rocked by â€˜security incidentâ€™ that has taken out hosted Exchange services The Register
â€˜Endangering Our National Securityâ€™: Senator Launches Inquiry Into Bidenâ€™s $200M Grant to China-Based Battery Company - Washington Free Beacon
â€˜Endangering Our National Securityâ€™: Senator Launches Inquiry Into Bidenâ€™s $200M Grant to China-Based Battery Company Washington Free Beacon
Why Malicious Programs Spread So Quickly?
It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc.
Lottery Scam, What It is and how to Avoid It?
Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago.
Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms
Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially.
An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me.
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing.
Phishing-Based Scams: A Couple of New Ones
Phishing in its "classic" variant is relatively well-known. Actually, 43.
Be Aware of Phishing Scams!
If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.
Protection for Your PC - Painless and Free!
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance.
The Importance of Protecting Your PC from Viruses and Spam
Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Secrets On Security: A Gentle Introduction To Cryptography
Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg.
Dont be a Dork - Protect Yourself
There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc.
Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body.
Top Ten Spyware and Adware Threats Identified
On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.
Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge
Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT.
How Spyware Blaster Can Protect Your Computer From Harm
By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today.
Online Shopping: 10 Tips For Safe Online Shopping
Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time.
How To Cover Your Tracks On The Internet
Every single time you access a website, you leave tracks. Tracks that others can access.
Phishing - A High Tech Identity Theft With A Low Tech Solution
Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief.
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords.
|home | site map|