![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is? No, it doesn't mean you grab a pole and head to the late to catchsome phish. The official Webopedia definition of "phishing" is as follows: The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. The e-mail directs the user to visit a Web sitewhere they are asked to update personal information, such aspasswords and credit card, social security, and bank accountnumbers, that the legitimate organization already has. The Website, however, is bogus and set up only to steal the user'sinformation. Phishers prey on ignorance, fear, and emotion. They also play thenumbers game. The more bait they email out, the more phishthey'll catch.. By spamming large groups of people, the "phisher"counts on his email being read and believed by a percentage ofpeople who will volunteer their personal and credit cardinformation. The latest attempt by identity theives to steal the personalinformation of eBay members hit my inbox earlier this week and Ihave to say, this one is pretty convincing. Even this old dog dida double-take before realizing that the identity thieves werephishing for my personal information again. The sender of this email is listed as: eBay Member - rivernickand the email subject line reads: Question from eBay Member. The email begins: "Question from eBay Member -- Respond Now. eBaysent this message on behalf of an eBay member via My Messages.Responses sent using email will not reach the eBay member. Usethe Respond Now button below to respond to this message." Listen to me: DON'T TOUCH THAT BUTTON Of course the email was NOT sent by an eBay member or sent viaeBay's messaging system, as it appears. The email then takes on a threatening tone. It reads: "Question from rivernick: I'm still waiting payment formy item for about 7 days. What happened? Please mail me ASAP or Iwill report you to ebay." The recipient is then prompted to respond to this ratherdisturbing email by clicking a "Respond Now." button. Doing so will take you to a website designed to look like eBaywhere you will be prompted to login using your eBay user name andpassword. Once you pass this point you will be asked to update your accountinformation before proceeding. Unknowing souls will offer notonly their eBay password, but personal and credit cardinformation, as well, without even knowing that they are about tohave their personal information stolen. The one thing that makes this scam so effective is the threat bythe supposed eBay member to "report you to eBay." The email preys on the fear of most eBay members that they are indanger of receiving negative feedback. Many eBayers would ratheryou cut off a pinky than leave them negative feedback. It is thisemotion that the new phishers are hoping to hook. The phisher is betting that most people will either be horrifiedby the threat of being wrongly reported to eBay or they will beticked off that some jerk is threatening them by mistake. Either way the phisher is counting on a percentage of people tohave a knee-jerk reaction and login to the fake eBay website hehas set up clear matters up. I've yet to see what percentage of people who receive thesephishing emails fall for the scam, but if a phisher gets 1% ofrecipients to turn over their personal information, he willprobably consider his phishing expedition a success. I've warned you about these phishing scams before, but let'sreview it one more time. NEVER reply directly to an email that appears to have come fromeBay, Paypal, Amazon, or anyoen else asking you to click a linkin the email to update your account information. If there is anydoubt in your mind whether or not the email is really from eBay,for example, open a browser and type in the URLhttp://www.ebay.com. NEVER click a link within the email torespond. NEVER believe that an email supposedly from another eBay memberis for real. Again, do not click an email link to reply. Open abrowser and go to eBay directly and log in. If the email was froma real member, there will be a record of the inquiry in your MyeBay account. You must be aware that there are bad guys out there who donothing but spend time trying to come up with new and innovativeways to steal your information. Be paranoid. Be aware. But don't be fooled. The phishers will cast their line, but you do not have to takethe bait. Here's to your success, Tim Knox Tim serves as the president and CEO of three successful technology companies and is the founder of DropshipWholesale.net, an online organization dedicated to the success of online and eBay entrepreneurs.http://www.dropshipwholesale.net
MORE RESOURCES: Large Language Models Pose Growing Security Risks The Wall Street Journal Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times UK minister met Chinese turbine company amid security concerns POLITICO Europe Protector app provides on-demand armed security ABC7 Los Angeles Tusk proposes 3-point plan to strengthen Ukraine, European security. Kyiv Independent Electric infrastructure security measure updated Unicameral Update HHS’s Proposed Security Rule Updates Will Require Adjustments to Accommodate Modern Vulnerability and Incident Response Issues The National Law Review HackerOne Debuts New Way to Quantify Security Value Channel Insider The Jones Act : A disastrous legacy for the U.S. economy and security Pacific Legal Foundation (PLF) Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations Elon Musk’s Private Security Are Now Special Deputies The Daily Beast Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Russia Recommends Increased Port Security Citing Threat from NATO The Maritime Executive US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network Regional peace depends on Iran's security Tehran Times Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 The Hacker News UN Security Council to Call on Rwanda to Pull Troops From Congo U.S. News & World Report Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Rep. Woolford on border security Michigan House Republicans Texada achieves top security certifications American Rental Association The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English How to secure Notes on iOS and macOS Help Net Security Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire AI app DeepSeek banned on Pennsylvania treasury-issued devices over privacy, security concerns CBS News Exabits partners with Phala Network to offer robust AI security with TEE-enabled infrastructure GlobeNewswire Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor TechCrunch OpenText unveils AI-powered threat detection and response capabilities Help Net Security Topic: Relations with Ukraine NATO HQ EU seeks to strengthen underwater cable security in Baltic and Mediterranean Kathimerini English Edition Apple drops key ADP security feature in UK Mobile World Live ‘Golden ticket to job security’: Trade union partnerships hold promise for high school students Youth Today Second Take: ‘The Winter Soldier’ tackles American democracy and security The Stanford Daily DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration Unarmed, undertrained, at risk: Advocates for Hawaii’s private security guards want change Hawaii News Now Venture capital firm Insight Partners faces security breach Security Magazine Endpoint Security and Network Monitoring News for the Week of February 21st: Menlo Security, Cymulate, OpenText, and More Solutions Review ID-Pal, Facephi join influential payments, security groups Biometric Update Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Retired doctor and courthouse security deputy seeking Belvidere Township 'CEO' job Northern Public Radio (WNIJ) |
![]() |
![]() |
![]() |
RELATED ARTICLES
Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. ![]() |
home | site map |
© 2006 |