Security Information |
3 Pervasive Phishing Scams
Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. 1. Financial Institutions. It is highly likely that you have already received this type of notice which appears to have come from your financial institution. It goes something like this:We are glad to inform you, that our bank has a new security system. The new updated technology will ensure the security of your payments through our bank. Hoping you understand that we are doing this for your own safety, we suggest you to update your account , this update will maintain the safety of your account. All you have to do is complete our online secured form. Thank you . Comment: No financial institution will require you to respond to an email asking you to update your account. In addition, I left in the typos, punctuation errors, and overall poorly worded request just as it is. Finally, many of these scams do not go to account holders as the phishers spam email accounts in the hope that someone will take the bait. 2. Paypal Account. This scam is giving Paypal/eBay fits as its says that billing information must be updated by you, the recipient of the notice. Verbiage is included whereby "Paypal" threatens to close your account if you do not respond, money will be withheld, etc. Comment: The first time I saw this note, I thought: huh?! The nerve of Paypal! However, I forwarded the letter to Paypal who confirmed its scammy nature. 3. ISP Fraud. An internet service provider has seen a number of "their" letters surface in emails around the US. A common request goes something like this: Dear Comcast customer, We recently attempted to charge your account but we seem to receive an error when charging your card. This sometimes occurs for a variety of reasons including card expiration, over limit, suspicion of fraud, or several other technical difficulties. Please visit the Comcast Service Center, by clicking on the hyperlink shown below, and update your information so this issue can be resolved. Comcast Service Center Thank you, Chris Hammonds Comcast Service Department Comment: Another request to obtain valuable information belonging to you. I have seen 3-4 variations of this letter, all allegedly from Comcast. Oftentimes, phishers will go to great lengths to copy the company's logo and other pertinent information and include that within the email. Almost without fail they provide a link for you to click on so that you will go to a site thinking that it is legitimate. Once at the scam site, all kinds of questions will be asked of you including: social security number, credit card information, your address, and more. The more information you give, the easier it will be for you to become a victim of identity theft as the perpetrators assume your identity and open up multiple accounts in your name. Usually the consumer knows nothing of the scam until they receive letters demanding payment for accounts opened up in their name, calls from creditors, and rejected credit applications because of assumed bad credit. The best defense, of course, is to not respond to the email. However, you can play an important part in stopping phishing fraud by forwarding a copy of the message to the company being mimicked. Their fraud department will be grateful and you will help them [as well as policing authorities] in their quest to stop phishers in their tracks. Matthew Keegan is The Article Writer who writes on just about any and every issue imaginable. You can preview samples from his high performing site at http://www.thearticlewriter.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. |
home | site map | contact us |