Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.

To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. The issue, though, is the pretence of such mail.

You may not even have such an account as referenced.

It doesn't come from the account provider.

It can use false S.S.L. references, to present an illusion of trust and security.

It can prompt for immediate action on your part, alleging false log-in's by persons unknown, and from countries unknown. If action is not taken, they can impress on you, that the account will be suspended or closed. Indeed, anything likely to work can be fabricated, to get you to the webpage suggested in the link or hyperlink. Note the word "suggested". Likenesses to company logos are used to re-enforce "credibility".

In fact, these phishing attempts actually look pretty good or realistic. So much so that any qualms of guilt or stupidity, experienced by a "conned party" are groundless.

Experience, specific education or forewarning, is all that prevents this type of charade from widening its base of "victims".

The goal is to get you to type in your details, complete with credit card number and the rest can be guessed.

Some damage is also absorbed by the organisation or company being misrepresented and they can do little about it but warn their customers what to watch out for, and issue security instructions. Indeed, it is from accounts at reputable companies that most passing trade learn the correct or most secure procedures. It is therefore important to read any material that they offer.

Generally though, reputable companies with a mind to preserve their integrity will tell you to log-in at their main page and proceed from there. Not through a link specific to your account!

Hyperlinks can mask the true domain that you'll be brought to, with the text linked to www.anydomaindotcom (example, only), a replica or fake page. Only going to secure pages where one believes that "https" will do it, will always help but wholly unreliable. The "s" is an indication of a secure page, but are you at the right domain?

Place your mouse over the link and the domain attached to such a link, should show itself. Viewing the source code is another way but some knowledge of it is necessary.

Another ploy, sometimes deliberate and sometimes "convenient", is inserting a reference to the "legitimate company" anywhere after the domain name. Ex. https://www.anydomaindotcom/ebay/aagle/. Unwary victims may overlook the fact that "ebay" is not the domain, but see it anyway as a directory or file name. Anyone, anywhere can have a file or directory named like that of a company.

To make matters somewhat worse from an "easy to identify" viewpoint, the source code of the link can be represented as an I.P. address rather than its named counterpart. There are some tools that you can use at which you can use to type in the I.P. address and cross reference it with the official account domain presented in the e-mail, or web page for that matter. Opening a second window for investigative purposes and re-sizing both to be side by side can be revealing, and comparisons be made between the alleged source and that of the source code. can be put in one window and can be put in the other. NOTE; you should be checking domains and ignoring everything that comes after the forward slash at the end of the domain. A similar test can be done for email viruses, where suspicious email addresses can be searched for some degree of authenticity.

If you are phished, try to learn as much as possible about it as phishing attempts and email viruses have some aspects in common. Incorrect spelling is one of them. You must understand that the authors can be from anywhere and not necessarily have degrees in English. Legitimate companies can also be from anywhere, with different primary languages, but do perfect their spellings and general grammar.

Attention to upper and lower case can be another giveaway. This is especially true where particular portions of the text are the design of the author, and not just copied and pasted. Typically, these portions are customised to be customer specific in a general sense, and fonts may even be different or out of place. Such "special" additions are to strengthen the sense of urgency and call to action.

Should you be the recipient of "phishy mail", you can forward it to [email protected]

Seamus Dolly and phising samples are at

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

WBAL Baltimore

Security guard fatally shoots man in Catonsville
WBAL Baltimore
A security guard fatally shot a man who fired his own gun after refusing to leave a Catonsville business Saturday, Baltimore County police said. County police said security guards were asking people to leave the parking lot because the business was closed.
Man killed after gunfire exchange with security guard at Catonsville ...Fox Baltimore

all 11 news articles »

Washington Post

Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reports
Washington Post
The round-the-clock security detail for Environmental Protection Agency Administrator Scott Pruitt cost taxpayers almost $3.5 million during his first year in office, according to figures published Friday by the agency. EPA spent more than $2.7 million ...
EPA Chief's Spending on Security: Nearly Double His Predecessors'New York Times
EPA chief's security bill soars, agency cites death threatsReuters
EPA spent nearly $3.5M on Pruitt securityCNN
Bloomberg -CBS News -CNBC -Politico
all 118 news articles »


Security News This Week: T-Mobile Web Portal Exposed 74 Million Accounts
T-Mobile has about 74 million customers, and the company added a credential login to protect the tool after receiving the alert from security researcher Ryan Stevenson. Per its bug bounty program, T-Mobile awarded Stevenson $1,000 for the discovery.


Google awarded this teenager $36000 for finding a security flaw
Ezequiel Pereira was about a month shy of 17 when he first got paid for exposing a Google security flaw through its bug bounty program. Pereira got his first computer when he was 10, took an initial programming class when he was 11 and then spent years ...

CBS New York

NYPD: Security Guard Struck & Killed By Glass Panel At Manhattan Construction Site
CBS New York
NEW YORK (CBSNewYork) — A security guard was killed and a worker was hurt when a large panel of glass fell at a construction site near Central Park Saturday morning. The FDNY said it responded to calls for a construction related accident at 217 West ...
Security guard dies after falling glass from Central Park Tower ...New York Daily News
Security guard crushed to death at Midtown construction site; 1 injuredWABC-TV
Security Guard Killed By Falling Glass Panel In Midtown:
WPIX 11 New York
all 9 news articles »


EPA has spent more than $3.5 million on Pruitt's security in first year in office
WASHINGTON, D.C. (ABC News) -- The Environmental Protection Agency confirmed Friday that it has spent more than $3.5 million on Administrator Scott Pruitt's security team since taking office, significantly more than his two predecessors.
EPA spends 30 percent more on Pruitt's security, cites death threatsYahoo News

all 49 news articles »

Kansas City Star (blog)

Security of the midterm elections needs attention now
Kansas City Star (blog)
When top intelligence officials went to Capitol Hill one morning last week to give House members a classified briefing on the security of the upcoming elections, only 40 or so bothered to show up. In other words, nine out of 10 lawmakers thought they ...
Homeland Security announces 15000 additional seasonal visas for companies at risk of failureThe Hill
Homeland Security issues 15000 more H-2B visas amid crab industry labor shortage in Maryland, elsewhereBaltimore Sun
Homeland Security authorizes 15000 visas to help struggling
The Boston Globe -Paulick Report
all 79 news articles »

The Jerusalem Post

Four Gazans breach security fence, flee back after IDF troops open fire
The Jerusalem Post
Thousands of Gazans have been demonstrating along the security fence since March 30, and on Friday some 5,000 gathered in two locations, burning tires and throwing stones at IDF troops, who fired tear gas and live rounds toward rioters. While no ...
Watch: Bomb placed near Gaza security fence neutralizedArutz Sheva
PA threatens to cut security ties with Israel if Gaza blockade liftedMiddle East Monitor

all 482 news articles »


Jailed British-Iranian aid worker to face trial on security charges: Iran court head
DUBAI (Reuters) - A detained British-Iranian aid worker sentenced to five years in jail in Iran is to face a second trial on new security charges, the semi-official Tasnim news agency on Saturday quoted Tehran Revolutionary Court's head Musa ...
Jailed British-Iranian Aid Worker To Face Trial On New Security ChargeRadioFreeEurope/RadioLiberty
Detained Iranian-British woman to face 'security charges'

all 14 news articles »


Netgear informs Arlo users of potential security threat, suggests changing passwords
We take the privacy and security of your account and personal information very seriously and have initiated an investigation into the suspicious activity. From our initial investigation, it appears that attackers may be using credentials obtained from ...

Google News

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More