![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Cyber Crooks Go Phishing
"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish. But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse. "Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more. Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet. Here's the basic pattern for a "phishing" scam... You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity. In the email it tells you that something bad is about to happen unless you act quickly. Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name. In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up. Once you give up your information... it's all over but the crying! After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse. An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers. In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal. They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it. Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account. This new "phishing" style scam works extremely well for 2 basic reasons. First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking. Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional frenzy. The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense. Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox. If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think! Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling. Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it. Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com). Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate. Above all remember this: Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information. They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details. About The Author Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links... Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.TurnWordsIntoTraffic.com
MORE RESOURCES: Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Italian police increase security at Tesla dealerships after 17 cars destroyed in Rome fire The Guardian Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com Restaurant owner hires security guards after quadruple shooting; residents wonder if it is enough WBAL-TV DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Space Security Sentinel Via Satellite Planning for your IAM Roles Anywhere deployment Amazon Web Services Mike Waltz’s team set up at least 20 Signal chats for national security work – report - The Guardian Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Waltz and staff used Gmail for government communications, officials say The Washington Post Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News Building a cybersecurity strategy that survives disruption Help Net Security NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press HPD, Homeland Security bust multiple game rooms FOX 26 Houston Charges Filed Against Former PUSD Security Guard Pasadena Now CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges Yahoo Finance New security system coming to Alaska’s Capitol building Your Alaska Link Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle National security implications of tariff announcement LiveNOW from FOX ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Parliament speaker Stefanchuk blocks Poroshenko’s US trip to international security conference, party says The Kyiv Independent Security by Design Requires Organizational Commitment BankInfoSecurity Security forces report 80% drop in Ramadan terror attacks, after West Bank crackdown The Times of Israel Women in Security: Alice DiSanto, VP of Marketing, Autonomous Solutions Inc. Security Sales & Integration ISC West 2025 Show Floor Spotlight: PROMETHEUS Security Info Watch Security firm Brinks Home sells Lancaster city location LancasterOnline Coral Gables commissioner raises concerns for security of elected officials NBC 6 South Florida Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance When will your Social Security benefits arrive in April? See 2025 payment schedule Democrat and Chronicle Secure Passage and Sunflower Labs take security to the skies with autonomous drone integration Police1 Contrast Security Debuts 'Channel-First' Strategy Channel Futures Why Active Directory’s 25-Year Legacy Is a Security Issue BankInfoSecurity Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Marlink New Cyber Company to Meet Customer Demand for Security & Compliance - The Maritime Executive Marlink New Cyber Company to Meet Customer Demand for Security & Compliance The Maritime Executive Diversus Health adds new Security-Widefield location FOX21 News Colorado Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight |
![]() |
![]() |
![]() |
RELATED ARTICLES
How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. ![]() |
home | site map |
© 2006 |