![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
3 Pervasive Phishing Scams
Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. 1. Financial Institutions. It is highly likely that you have already received this type of notice which appears to have come from your financial institution. It goes something like this:We are glad to inform you, that our bank has a new security system. The new updated technology will ensure the security of your payments through our bank. Hoping you understand that we are doing this for your own safety, we suggest you to update your account , this update will maintain the safety of your account. All you have to do is complete our online secured form. Thank you . Comment: No financial institution will require you to respond to an email asking you to update your account. In addition, I left in the typos, punctuation errors, and overall poorly worded request just as it is. Finally, many of these scams do not go to account holders as the phishers spam email accounts in the hope that someone will take the bait. 2. Paypal Account. This scam is giving Paypal/eBay fits as its says that billing information must be updated by you, the recipient of the notice. Verbiage is included whereby "Paypal" threatens to close your account if you do not respond, money will be withheld, etc. Comment: The first time I saw this note, I thought: huh?! The nerve of Paypal! However, I forwarded the letter to Paypal who confirmed its scammy nature. 3. ISP Fraud. An internet service provider has seen a number of "their" letters surface in emails around the US. A common request goes something like this: Dear Comcast customer, We recently attempted to charge your account but we seem to receive an error when charging your card. This sometimes occurs for a variety of reasons including card expiration, over limit, suspicion of fraud, or several other technical difficulties. Please visit the Comcast Service Center, by clicking on the hyperlink shown below, and update your information so this issue can be resolved. Comcast Service Center Thank you, Chris Hammonds Comcast Service Department Comment: Another request to obtain valuable information belonging to you. I have seen 3-4 variations of this letter, all allegedly from Comcast. Oftentimes, phishers will go to great lengths to copy the company's logo and other pertinent information and include that within the email. Almost without fail they provide a link for you to click on so that you will go to a site thinking that it is legitimate. Once at the scam site, all kinds of questions will be asked of you including: social security number, credit card information, your address, and more. The more information you give, the easier it will be for you to become a victim of identity theft as the perpetrators assume your identity and open up multiple accounts in your name. Usually the consumer knows nothing of the scam until they receive letters demanding payment for accounts opened up in their name, calls from creditors, and rejected credit applications because of assumed bad credit. The best defense, of course, is to not respond to the email. However, you can play an important part in stopping phishing fraud by forwarding a copy of the message to the company being mimicked. Their fraud department will be grateful and you will help them [as well as policing authorities] in their quest to stop phishers in their tracks. Matthew Keegan is The Article Writer who writes on just about any and every issue imaginable. You can preview samples from his high performing site at http://www.thearticlewriter.com
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Get to know new security leaders at OSU-CHS Oklahoma State University Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Mobile Applications: A Cesspool of Security Issues Dark Reading US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Inside the Fiasco at the National Security Council The Atlantic Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips ATA Transportation Security Council Recognizes Fleets American Trucking Associations New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs King County Security Tips – “Google” yourself kcemployees.com Fiesta goers can expect increased security at main events Texas Public Radio Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Rome Health to install new security systems Rome Sentinel Pete Hegseth’s bad calls: Unfit defense secretary is a major security risk New York Daily News Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Temple University stepping up security after several students assaulted near campus last week CBS News Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Windows "inetpub" security fix can be abused to block future updates BleepingComputer Verkada launches executive protection offering Security Systems News Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer New Syrian foreign minister attends UN Security Council in first US appearance since Assad's fall AJC.com Increased Security at City Courthouses? Unanswered Questions Baltimore Witness The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration ‘We need to apprehend him’: $10K reward offered for Family Dollar ‘security guard’ who killed man WSB-TV |
![]() |
![]() |
![]() |
RELATED ARTICLES
Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. HackAttack P C. owners are constantly at risk from attacks by hackers. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. ![]() |
home | site map |
© 2006 |