The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?
No, it doesn't mean you grab a pole and head to the late to catchsome phish.
The official Webopedia definition of "phishing" is as follows:
The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. The e-mail directs the user to visit a Web sitewhere they are asked to update personal information, such aspasswords and credit card, social security, and bank accountnumbers, that the legitimate organization already has. The Website, however, is bogus and set up only to steal the user'sinformation.
Phishers prey on ignorance, fear, and emotion. They also play thenumbers game. The more bait they email out, the more phishthey'll catch.. By spamming large groups of people, the "phisher"counts on his email being read and believed by a percentage ofpeople who will volunteer their personal and credit cardinformation.
The latest attempt by identity theives to steal the personalinformation of eBay members hit my inbox earlier this week and Ihave to say, this one is pretty convincing. Even this old dog dida double-take before realizing that the identity thieves werephishing for my personal information again.
The sender of this email is listed as: eBay Member - rivernickand the email subject line reads: Question from eBay Member.
The email begins: "Question from eBay Member -- Respond Now. eBaysent this message on behalf of an eBay member via My Messages.Responses sent using email will not reach the eBay member. Usethe Respond Now button below to respond to this message."
Listen to me: DON'T TOUCH THAT BUTTON
Of course the email was NOT sent by an eBay member or sent viaeBay's messaging system, as it appears.
The email then takes on a threatening tone.
It reads: "Question from rivernick: I'm still waiting payment formy item for about 7 days. What happened? Please mail me ASAP or Iwill report you to ebay."
The recipient is then prompted to respond to this ratherdisturbing email by clicking a "Respond Now." button.
Doing so will take you to a website designed to look like eBaywhere you will be prompted to login using your eBay user name andpassword.
Once you pass this point you will be asked to update your accountinformation before proceeding. Unknowing souls will offer notonly their eBay password, but personal and credit cardinformation, as well, without even knowing that they are about tohave their personal information stolen.
The one thing that makes this scam so effective is the threat bythe supposed eBay member to "report you to eBay."
The email preys on the fear of most eBay members that they are indanger of receiving negative feedback. Many eBayers would ratheryou cut off a pinky than leave them negative feedback. It is thisemotion that the new phishers are hoping to hook.
The phisher is betting that most people will either be horrifiedby the threat of being wrongly reported to eBay or they will beticked off that some jerk is threatening them by mistake.
Either way the phisher is counting on a percentage of people tohave a knee-jerk reaction and login to the fake eBay website hehas set up clear matters up.
I've yet to see what percentage of people who receive thesephishing emails fall for the scam, but if a phisher gets 1% ofrecipients to turn over their personal information, he willprobably consider his phishing expedition a success.
I've warned you about these phishing scams before, but let'sreview it one more time.
NEVER reply directly to an email that appears to have come fromeBay, Paypal, Amazon, or anyoen else asking you to click a linkin the email to update your account information. If there is anydoubt in your mind whether or not the email is really from eBay,for example, open a browser and type in the URLhttp://www.ebay.com. NEVER click a link within the email torespond.
NEVER believe that an email supposedly from another eBay memberis for real. Again, do not click an email link to reply. Open abrowser and go to eBay directly and log in. If the email was froma real member, there will be a record of the inquiry in your MyeBay account.
You must be aware that there are bad guys out there who donothing but spend time trying to come up with new and innovativeways to steal your information.
Be paranoid. Be aware. But don't be fooled.
The phishers will cast their line, but you do not have to takethe bait.
Here's to your success,
Tim serves as the president and CEO of three successful technology companies and is the founder of DropshipWholesale.net, an online organization dedicated to the success of online and eBay entrepreneurs.http://www.dropshipwholesale.net
false The Hill
Gazprom security outfit raises concern of new Russia mercenary army Business Insider
Landmark national security trial of Hong Kong democracy activists begins. Here's what you need to know - CNN
Landmark national security trial of Hong Kong democracy activists begins. Here's what you need to know CNN
Indonesian security forces search for NZ pilot taken hostage The Associated Press - en Español
Tallahassee hospital IT security 'event' has signs of ransomware attack Tallahassee Democrat
DoD and Danish Ministry of Defense Sign Security of Supply ... Department of Defense
Ukraine: Meeting under the “Threats to International Peace and ... Security Council Report
Tallahassee Memorial resumes 'limited' elective procedures as IT ... WUSF Public Media
Security Think Tank: Poor training is worse than no training at all ComputerWeekly.com
The Worldwide Cyber Security Consulting Services Industry is Anticipated to Reach $8.614 Billion in 2027 - Yahoo Finance
The Worldwide Cyber Security Consulting Services Industry is Anticipated to Reach $8.614 Billion in 2027 Yahoo Finance
Minerals Security Partnership Governments Engage with African ... Department of State
Drug distributor AmerisourceBergen confirms security breach BleepingComputer
Check Point Software Releases its 2023 Security Report ... Check Point Software
Joint Statement following a UN Security Council meeting on Syria ... - United States Mission to the United Nations
Joint Statement following a UN Security Council meeting on Syria ... United States Mission to the United Nations
River Cree Resort and Casino updates security with Genetec Security Magazine
Coal emissions must fall, but energy security is vital World Economic Forum
Governor Abbott Announces Statewide Plan Banning Use Of TikTok Office of the Texas Governor
New FTX CEO says security so bad execs could have stolen $500M Business Insider
CEO Of Security Company Sentenced To Five Years In Prison For ... Department of Justice
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Smiths Detection security tech to equip five New Zealand airports Airport Technology
Central American Security Conference (CENTSEC) 2023 U.S. Southern Command
President Biden Announces Appointments to the President’s ... The White House
Ukraine's Caverns Offer Europe Energy Security Center for European Policy Analysis
Estonian Intelligence Service Warns Of 'Security Risks' From Russia - Radio Free Europe / Radio Liberty
Estonian Intelligence Service Warns Of 'Security Risks' From Russia Radio Free Europe / Radio Liberty
St. Lucie County considers new security cameras following deadly mass shooting - WPTV News Channel 5 West Palm
St. Lucie County considers new security cameras following deadly mass shooting WPTV News Channel 5 West Palm
Department of Homeland Security limits no-knock warrants, chokeholds in updated use-of-force policy - Yahoo! Voices
Department of Homeland Security limits no-knock warrants, chokeholds in updated use-of-force policy Yahoo! Voices
Memphis Police Chief Trained With Israel Security Forces The Intercept
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package - CNN
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package CNN
DHS Announces Process Enhancements for Supporting Labor ... Homeland Security
Speech, Speed and Security: What's new in Chrome 110 Chrome Unboxed
U.S. military poised to secure new access to key Philippine bases The Washington Post
File Sharing - What You Need to Know!
File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home.
Corporate Security for Your Home Business
The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations.
The Importance of Protecting Your PC from Viruses and Spam
Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit.
Lottery Scam, What It is and how to Avoid It?
Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago.
IPv6 - Next Step In IP Security
IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
Breaking Into Your PC: News...
You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
Spyware Protection Software
Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically.
Free Spyware Removal - Its Not As Easy As It Sounds
Nobody wants to pay to remove spyware. At the very least, I don't.
Crack The Code - Thats A Direct Challenge
I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network.
How to Thwart the Barbarian Spyware!
Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics.
Protecting Your Identity On The Internet
Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www.
Ransom Trojan Uses Cryptography for Malicious Purpose
Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well.
Website Security - Creating a Bulletproof Site in 5 Easy Steps
When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site.
Email Scams - Ten Simple Steps To Avoiding Them
According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims.
A Painless Plagiarism Solution
A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www.
What Every Internet Marketer Should Know About Spyware
If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things.
Computer-Virus Writers: A Few Bats In The Belfry?
"Male. Obsessed with computers.
|home | site map|