![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Phishing - Its Signs and Your Options
Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. I hope to give you enough examples and information to help you to safeguard yourself from these unsavory individuals. In addition, sometimes the email is sent to malicious software so as to render your computer helpless. Thus, it is important that you do not click on the link they provide, because that is the trigger that will load the software to your system. EXAMPLES OF PHISHING You receive hundreds of emails in your mailbox, but one email catches your eye - it directs you to a website, requesting that you need to update your personal information. It requests such personal information as: passwords "It appears to be legitimate", you say to yourself. And you also notice that the emails are from companies that you have been doing business with for a while. Warning: The website could be bogus. Here are several examples of phishing in action. 1. E-mails stating they are from E-bay and they feel that your account may have been compromised and would like you to verify your information with they so conveniently supply. DO NOT click on it. 2. E-mails from Paypal or your bank asking that you verify your information because they feel that your account has been compromised, or heaven forbid, suspended. Same scenario, different company. DO NOT click on the link. 3. E-mail that states that an unauthorized transaction has occurred on your account. Please click the link below and confirm your identity. DO NOT. 4. Here's a work at home scam - We have seen your resume on Monster and feel you would fit our position. If you are interested, please go to our website, look over the experience required and submit your resume if you have this background. Website is professional looking, offer looks good - but it could be a scam. WHAT ARE THEY AFTER In the above examples they are after information about you, be it passwords, credit cards, social security numbers, anything that can identify you - and that which they can use to profit from you. The job email is used to verify that the email address is a true blue, active email address. What do they do with this info - they sell these accounts to spammers for good money. They need to verify your email address-because if the spammers come up empty - this person's business is dead. HOW TO VERIFY SAFELY 1. If they want you to verify your account, do not cut and paste, or use the link they provide in the email. Close your Internet session, open a new session and enter the site that you have on record to verify. 2. Emails requesting resumes - Verify their account before you send your resume. When verifying - these red flags should be considered: 1) If they are hesitant to provide a phone number - might be a scam. 2) If their business address is not verifiable -might be a scam. 3) If the website is new - might be a scam. 4) If they use a large company's name-and that company never heard of them - might be a scam.5) Again, verify this information before you send your resume. WAYS TO PROTECT YOURSELF Here are some quick tips to protect you and your computer system. 1. Use anti-virus software and a firewall - keep them up to date. 2. If you have a broadband connection make sure you have a firewall in place. 3. Don't email personal or financial information. 4. Before providing personal information - search to see if the site is secure - look for a lock icon. However, remember not all phishers are stupid - in fact, they could be computer savvy enough to forge security icons. Thus, look for a site whose link looks like this: https://www.somename.com -- this shows that it is a secure site. 5. Coupons from respected companies - Verify that it is a true-blue coupon from the company - I had one coupon sent to my email address from what I thought was Staples. Verified it with Staples - not a coupon honored by Staples. When on the Internet - if it looks like a duck, quacks like a duck, it still may not be a duck! 6. When making transactions on the Internet - be it online banking, Paypal, Internet Gold, etc. - complete your transaction, log out of the website, and close out of your Internet Explorer-and then continue with a new session of Internet Explorer. WHERE TO FORWARD SPAM THAT IS PHISHNG If you encounter spam that is phishing, or are a victim of a phishing scam, you can forward the information to spam@uce.gov and to the company, bank or organization that the email may have stated they are from. In many cases, the other organizations have information on their website where you can report the attempted scam. In addition, if you have been scammed, and you wish to file a complaint - go to ftc.gov. To conclude, no one is immune to spam or a scam. But try to be ever vigilant and do your due diligence with anything you do on the Internet. But being human is a scammer's hope - they know that most will ignore the bait, but some will be tempted. So, if you so humanly slip, and succumb to a phishing scam, you can report them to ftc.gov. Vickie J Scanlon has a BBA degree in Administrative Management and Marketing. Visit her site at: http://www.myaffiliateplace.biz for free tools, articles, ebooks, how to info, affiliate opportunities, products and services - to meet your budget and needs.
MORE RESOURCES: Waltz and staff used Gmail for government communications, officials say The Washington Post Blocking 7-Eleven deal on security grounds would hurt Japan's image, head of state-backed fund says Reuters Armenia refuses to finance Russian-led CSTO security alliance budget The Kyiv Independent Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles A week in security (March 24 – March 30) Malwarebytes Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight EU analysis highlights space capabilities, lists scenarios for space security by 2050 Industrial Cyber Alaska Capitol will get airport-style security checkpoint, legislative panel orders Anchorage Daily News Mobile police installing new security cameras at city parks, following shootout at Langan Park fox10tv.com Mike Waltz Faces Another Embarrassing Data Security Failure The Daily Beast Fortress Government Solutions receives impact Level 6 security accreditation from US Navy Industrial Cyber Leaders Describe Host of Threats to Homeland, Steps to Mitigate Them U.S. Department of Defense (.gov) MPD: Driver of security truck issued several traffic citations after hitting pedestrian along S. Parkway East Action News 5 The urgent reality of machine identity security in 2025 csoonline.com SCOTUS examines court’s role in national security Courthouse News Service Lawmatics Achieves SOC 2 & HIPAA Compliance, Reinforcing Commitment to Data Security and Privacy LawSites Women in Security: Tia Eskandari, Senior Director, Allied Universal Security Sales & Integration Could drones replace school security guards? FOX 7 Austin Breaking the Cone of Silence: The Jigsaw Puzzle of Operational Security Security Clearance Jobs National Security Council confirms Mike Waltz and staff used Gmail for government communication New York Post City to receive $94K in Homeland Security grant funding Oil City News Pasadena school security guard fired after allegations she forced student to duct tape mouth Pasadena Star News ReliaQuest Closes $500M Round to Boost Agentic AI Security BankInfoSecurity Security officer made Pasadena middle schooler duct-tape her own mouth shut, father says Los Angeles Times LightPath Technologies to Exhibit Advanced Infrared Solutions at 2025 Border Security Expo PR Newswire "Credible Threat" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine Forget Signal. National Security Adviser Waltz now accused of using Gmail for work - theregister.com BitLyft Gives Back to the Information Security Community GlobeNewswire Israel’s National Security Council Warns of Increased Threats to Jews Abroad Ahead of Passover Algemeiner.com Akron-Canton Airport has new security measure: K9 Luna Cleveland 19 News Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth AI Agent and Copilot Podcast: Microsoft Exec Dorothy Li on Role of AI Agents, Ecosystem in Security Cloud Wars Gun-detecting dogs join LVHN security team Times News Online Senate Education Focuses On School Security, Classroom Aides West Virginia Public Broadcasting Secure Passage and Sunflower Labs Take Security to the Skies with Autonomous Drone Integration PR Newswire Security dog bites woman at Mayfair Mall, police describe fight FOX6 News Milwaukee Jozu Accelerates Enterprise AI with 10x Faster Deployment and Contributes Security Project to CNCF Morningstar This Security Control Is So Good We Don’t Even Have to Turn It On (LIVE in Clearwater, FL) CISO Series Clemson Po-po enforces TSA security at all downtown bars thetigercu.com Europe on the horns of the security dilemma Le Monde diplomatique - English Two new security K-9s join Lehigh Valley Health Network NBC10 Philadelphia Haiti’s upcoming constitutional referendum: A controversial process amid political and security crisis The Haitian Times Weekly Student News Quiz: Earthquake, Security Breach, Baseball Season The New York Times Motel security guard kills man after altercation in Northwest Dallas FOX 4 News Dallas-Fort Worth Border security and enforcement is an important issue The Clarion-Ledger |
![]() |
![]() |
![]() |
RELATED ARTICLES
Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. ![]() |
home | site map |
© 2006 |