Security Information |
|
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is? No, it doesn't mean you grab a pole and head to the late to catchsome phish. The official Webopedia definition of "phishing" is as follows: The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. The e-mail directs the user to visit a Web sitewhere they are asked to update personal information, such aspasswords and credit card, social security, and bank accountnumbers, that the legitimate organization already has. The Website, however, is bogus and set up only to steal the user'sinformation. Phishers prey on ignorance, fear, and emotion. They also play thenumbers game. The more bait they email out, the more phishthey'll catch.. By spamming large groups of people, the "phisher"counts on his email being read and believed by a percentage ofpeople who will volunteer their personal and credit cardinformation. The latest attempt by identity theives to steal the personalinformation of eBay members hit my inbox earlier this week and Ihave to say, this one is pretty convincing. Even this old dog dida double-take before realizing that the identity thieves werephishing for my personal information again. The sender of this email is listed as: eBay Member - rivernickand the email subject line reads: Question from eBay Member. The email begins: "Question from eBay Member -- Respond Now. eBaysent this message on behalf of an eBay member via My Messages.Responses sent using email will not reach the eBay member. Usethe Respond Now button below to respond to this message." Listen to me: DON'T TOUCH THAT BUTTON Of course the email was NOT sent by an eBay member or sent viaeBay's messaging system, as it appears. The email then takes on a threatening tone. It reads: "Question from rivernick: I'm still waiting payment formy item for about 7 days. What happened? Please mail me ASAP or Iwill report you to ebay." The recipient is then prompted to respond to this ratherdisturbing email by clicking a "Respond Now." button. Doing so will take you to a website designed to look like eBaywhere you will be prompted to login using your eBay user name andpassword. Once you pass this point you will be asked to update your accountinformation before proceeding. Unknowing souls will offer notonly their eBay password, but personal and credit cardinformation, as well, without even knowing that they are about tohave their personal information stolen. The one thing that makes this scam so effective is the threat bythe supposed eBay member to "report you to eBay." The email preys on the fear of most eBay members that they are indanger of receiving negative feedback. Many eBayers would ratheryou cut off a pinky than leave them negative feedback. It is thisemotion that the new phishers are hoping to hook. The phisher is betting that most people will either be horrifiedby the threat of being wrongly reported to eBay or they will beticked off that some jerk is threatening them by mistake. Either way the phisher is counting on a percentage of people tohave a knee-jerk reaction and login to the fake eBay website hehas set up clear matters up. I've yet to see what percentage of people who receive thesephishing emails fall for the scam, but if a phisher gets 1% ofrecipients to turn over their personal information, he willprobably consider his phishing expedition a success. I've warned you about these phishing scams before, but let'sreview it one more time. NEVER reply directly to an email that appears to have come fromeBay, Paypal, Amazon, or anyoen else asking you to click a linkin the email to update your account information. If there is anydoubt in your mind whether or not the email is really from eBay,for example, open a browser and type in the URLhttp://www.ebay.com. NEVER click a link within the email torespond. NEVER believe that an email supposedly from another eBay memberis for real. Again, do not click an email link to reply. Open abrowser and go to eBay directly and log in. If the email was froma real member, there will be a record of the inquiry in your MyeBay account. You must be aware that there are bad guys out there who donothing but spend time trying to come up with new and innovativeways to steal your information. Be paranoid. Be aware. But don't be fooled. The phishers will cast their line, but you do not have to takethe bait. Here's to your success, Tim Knox Tim serves as the president and CEO of three successful technology companies and is the founder of DropshipWholesale.net, an online organization dedicated to the success of online and eBay entrepreneurs.http://www.dropshipwholesale.net
MORE RESOURCES: After student allegedly threatens classmate with gun, Ambridge Area School District makes security changes CBS Pittsburgh Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post US ambassador says Mexico 'closed the doors' on security cooperation and denies its violence problem ABC News The UN cybercrime convention threatens security research. The US should do something about it CyberScoop Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press Opinion | Trump’s national security wrecking crew The Washington Post U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times The Fastest Airport Security Line You Don’t Know About The Wall Street Journal Do Titans QB, Coach Have Job Security? Sports Illustrated ‘Never trust, always verify’: The zero trust approach to network security United States Army The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Tuskegee president releases security updates following shooting WIAT - CBS42.com Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider Tuskegee University Shifts Security, Facilities Leadership Tuskegee University Endpoint Security from BlackBerry BlackBerry 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Suspect in Little Italy shootout with police was a security guard doing contract work for MTS CBS News 8 France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times Trump’s National Security Team Keeps Getting More Extreme The New Republic South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV Lamar CISD invests in safety, security amid rapid growth Community Impact How security partnerships are transforming to meet modern demands SecurityInfoWatch Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times 11/14/24 National Security and Korean News and Commentary smallwarsjournal ASIS, International Protective Security Board Sign Memorandum of Understanding Security Sales & Integration Federal officials warn Boston churches to increase security after wave of arson attacks CatholicVote org Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch Suspect in Little Italy shootout with police was a security guard doing contract work for MTS CBS News 8 Arizona governor pledges work with Trump to secure the border Arizona's Family Gov. Gianforte unveils budget proposal built around 'security and prosperity' Bozeman Daily Chronicle Trump Picks Kristi Noem for Homeland Security Secretary The New York Times ASIS International, International Protective Security Board sign MOU SecurityInfoWatch Microsoft Patch Tuesday, November 2024 Edition Krebs on Security USX Cyber Expands Phishing Defense in GUARDIENT XDR with Advanced Email Security Training Tools PR Newswire Seven Recommendations for the New Administration and Congress: Building U.S. Critical Minerals Security Center for Strategic & International Studies Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times |
RELATED ARTICLES
Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. |
home | site map |
© 2006 |