Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Fishing for Fortunes. Scam! > NetSparsh - Viral Content you Love & Share

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.

To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. The issue, though, is the pretence of such mail.

You may not even have such an account as referenced.

It doesn't come from the account provider.

It can use false S.S.L. references, to present an illusion of trust and security.

It can prompt for immediate action on your part, alleging false log-in's by persons unknown, and from countries unknown. If action is not taken, they can impress on you, that the account will be suspended or closed. Indeed, anything likely to work can be fabricated, to get you to the webpage suggested in the link or hyperlink. Note the word "suggested". Likenesses to company logos are used to re-enforce "credibility".

In fact, these phishing attempts actually look pretty good or realistic. So much so that any qualms of guilt or stupidity, experienced by a "conned party" are groundless.

Experience, specific education or forewarning, is all that prevents this type of charade from widening its base of "victims".

The goal is to get you to type in your details, complete with credit card number and the rest can be guessed.

Some damage is also absorbed by the organisation or company being misrepresented and they can do little about it but warn their customers what to watch out for, and issue security instructions. Indeed, it is from accounts at reputable companies that most passing trade learn the correct or most secure procedures. It is therefore important to read any material that they offer.

Generally though, reputable companies with a mind to preserve their integrity will tell you to log-in at their main page and proceed from there. Not through a link specific to your account!

Hyperlinks can mask the true domain that you'll be brought to, with the text linked to www.anydomaindotcom (example, only), a replica or fake page. Only going to secure pages where one believes that "https" will do it, will always help but wholly unreliable. The "s" is an indication of a secure page, but are you at the right domain?

Place your mouse over the link and the domain attached to such a link, should show itself. Viewing the source code is another way but some knowledge of it is necessary.

Another ploy, sometimes deliberate and sometimes "convenient", is inserting a reference to the "legitimate company" anywhere after the domain name. Ex. https://www.anydomaindotcom/ebay/aagle/. Unwary victims may overlook the fact that "ebay" is not the domain, but see it anyway as a directory or file name. Anyone, anywhere can have a file or directory named like that of a company.

To make matters somewhat worse from an "easy to identify" viewpoint, the source code of the link can be represented as an I.P. address rather than its named counterpart. There are some tools that you can use at which you can use to type in the I.P. address and cross reference it with the official account domain presented in the e-mail, or web page for that matter. Opening a second window for investigative purposes and re-sizing both to be side by side can be revealing, and comparisons be made between the alleged source and that of the source code. can be put in one window and can be put in the other. NOTE; you should be checking domains and ignoring everything that comes after the forward slash at the end of the domain. A similar test can be done for email viruses, where suspicious email addresses can be searched for some degree of authenticity.

If you are phished, try to learn as much as possible about it as phishing attempts and email viruses have some aspects in common. Incorrect spelling is one of them. You must understand that the authors can be from anywhere and not necessarily have degrees in English. Legitimate companies can also be from anywhere, with different primary languages, but do perfect their spellings and general grammar.

Attention to upper and lower case can be another giveaway. This is especially true where particular portions of the text are the design of the author, and not just copied and pasted. Typically, these portions are customised to be customer specific in a general sense, and fonts may even be different or out of place. Such "special" additions are to strengthen the sense of urgency and call to action.

Should you be the recipient of "phishy mail", you can forward it to [email protected]

Seamus Dolly and phising samples are at

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

New York Times

Trump's National Security Chief Calls Russian Interference 'Incontrovertible'
New York Times
MUNICH — Just hours after the Justice Department indicted 13 Russians in what it charged was a broad conspiracy to alter the 2016 election, President Trump's national security adviser, Lt. Gen. H. R. McMaster, accused Moscow of engaging in a campaign ...
US and Russian Officials Spar at Security Conference Over Election MeddlingWall Street Journal
Trump's national security adviser: Evidence that Russia meddled in US election 'incontrovertible'CNBC
Trump's top security advisor says Russian meddling 'incontrovertible'Los Angeles Times
New York Post -BuzzFeed News -CNN -Twitter
all 1,376 news articles »

New York Times

Theresa May, in Munich, Calls for Swift Security Pact and Offers Concession
New York Times
On Saturday, just a little more than a year before the process known as Brexit concludes, Mrs. May put her strongest card on the table — Britain's defense and police capabilities — and urged European partners to agree to a new security treaty ...
May: 'Ideology' must not impede Brexit security dealCNN
NATO Pushes EU to Work With Allies for SecurityWall Street Journal
May: New security deal should be effective by next yearBBC News -Reuters -Fox Business
all 397 news articles »


John Kelly overhauls White House security clearances
White House Chief of Staff John Kelly is overhauling the Trump administration's security clearance process for staff. The decision comes in the wake of the Rob Porter scandal and amid reports that dozens of White House officials, including Trump's son ...
Kelly Orders Changes to Security Clearance Process at White HouseNew York Magazine
White House security clearance changes could affect Kushner's jobAxios
Chief of Staff Orders an Overhaul for Security ClearancesNew York Times
NPR -ThinkProgress -CNN -Politico
all 171 news articles »


Sqreen wants to become the IFTTT of web app security
French startup Sqreen recently launched a Security Hub with dozens of plugins to put you in control of the security of your web app. In many ways, it feels like enabling tasks on popular automation service IFTTT. Sqreen participated in TechCrunch's ...

and more »


US government is 'exceptionally vulnerable' to cyberattacks, security ...
The United States is "vulnerable" to cybersecurity attacks and need to step up their defense mechanisms, the co-founder of the computer security firm CrowdStrike told CNBC Saturday.

and more »

Chicago Tribune

Trump's national security adviser says Russian meddling 'incontrovertible'
Chicago Tribune
But both were immediately hit with questions about the U.S. indictment and the broader issue of cyberattacks. In Russia, news of the indictment was met with more scorn. "There are no official claims, there is no proof for this. That's why they are just ...

and more »

Washington Post

After Fla. shooting, schools tighten security, field threats and reassure parents
Washington Post
Schools across the Washington region tightened security and reviewed safety measures in the aftermath of a mass shooting at a Florida high school, even as two Maryland school systems fielded threats of violence. In Montgomery County, parents arrived by ...
New Jersey schools report threats, boost security measuresNews 12 New Jersey

all 429 news articles »

NATO HQ (press release)

NATO Secretary General meets world leaders at the Munich Security Conference
NATO HQ (press release)
The Secretary General also met with the Austrian Federal Chancellor Sebastian Kurz to discuss NATO's partnership with Austria. In talks with President Petro Poroshenko of Ukraine, the Secretary General reiterated NATO's strong support for Ukraine's ...
Russia interference should be countered with 'the truth' and not 'more propaganda,' NATO chief saysCNBC
Diplomatic tensions at day two of Munich Security Conferenceeuronews

all 15 news articles »

New York Times

Brazil's Military Is Put in Charge of Security in Rio de Janeiro
New York Times
RIO DE JANEIRO — After months of escalating violence in Rio de Janeiro that included television coverage of tourists being chased and beaten by robbers during the famed Carnival festivities, Brazil's president on Friday ordered the military to take ...
Brazil: Army takes control of Rio security in bid to quash gang violenceDeutsche Welle
Brazil's military to take over security in violence-scarred Rio de JaneiroWashington Post
Michel Temer signs security decree to stem Rio
BBC News -Wall Street Journal -Bloomberg
all 119 news articles »

CBS New York

Hoboken Police Investigate City Hall Security Breach
CBS New York
HOBOKEN, N.J. (CBSNewYork) – There has been a security breach at City Hall in Hoboken, where Mayor Ravi Bhalla says he and his family have received death threats. Police said a man walked into City Hall around 8 p.m. Thursday, passed through a metal ...

and more »
Google News

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More