Security Information |
Phishing-Based Scams: A Couple of New Ones
Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp. Despite the sad fact that about 5% of phishing attempts are successful for fraudsters, PC users are getting more cautious about bogus e-mails asking for personal and/or financial information. As public awareness of phishing methods grows, phishers are inventing new tactics in an attempt to delude people. Yet Another Phishing Scheme: Don't Fax Back, Please On August 10, 2005 experts from SophosLabs warned us users about a new phishing trick. No bogus websites this time: phishers were trying to make people to send their credit card information? by fax. The emails claim to be from Paypal, the payment system used by the popular Ebay auction website. They tell a user that a security breach has occurred - someone tried to reset his password. Rather clichéd, isn't it? Lots of phishers follow this pattern. The difference is that no bogus online forms are involved. The email urges the user to download the form (Microsoft Word document), fill it and send by fax. The online form is hosted on a Polish server. The fields to fill in include: credit card details used in the Paypal account (name on the credit card, its number, type, expiration date), as well as email address on Paypal account with password, post address and phone numbers. With such a lot of personal identifying information it won't be difficult for a fraudster to pose as this person and commit a bunch of crimes, from cleaning all money from the account to setting deals under the victim's name. One hasn't to be a genius to guess what people this scam is aimed at. Having heard and read about bogus phishing websites, users are getting suspicious about filling forms online. They might think that faxing personal details is safer -- and make a very costly mistake. Phishers take advantage of our carelessness and credulity. eBay Scheme - Specially for Kind-Hearted This scam is even more brazen, because it exploits people's generosity and kindness. Giving a helping hand to an elderly woman - what can be more natural for any human being? Emails come ostensibly from Greta, a wheelchair-bound woman of 89. This lady can't find a particular auction, so she "asks you for help". When some Good Samaritan, willing to assist her, clicks the link in the email, he or she is directed to a bogus eBay site, then, unaware of the deceit, clicks the 'respond now' button and logs on. User names and passwords, obtained this way, most likely will be used to set up deals on eBay under names of other people. The only way to prevent such scams is stop being credulous and careless. Don't uncritically believe everything you read about -- especially in emails from people you don't know personally. Don't give out your personal information before verifying where it goes to and whether the claim is genuine. Whatever the means of providing information -- phone, fax, snail mail or email -- if you hand out certain information, you lose it. Spam remains one of the favorite tools for identity thieves of all stripes. Never responding, never clicking links within fraudulent spam messages, or, even better, deleting them straight away should become a habit, like washing hands or cleaning teeth. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. Its software effectively prevents keyloggers from stealing information. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. |
home | site map | contact us |