Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity.

The Anti-Phishing Working Group estimates that 75 million to 150 million phishing emails are sent every day on the internet. Phishing (pronounced fishing), is online identity theft that uses spoof emails, fraudulent websites and crimeware to trick unsuspecting internet users into providing financial data, credit card numbers, social security numbers, account logins and passwords, etc.

A spoofed email looks like it is from a legitimate company, usually banks, credit card companies, paypal, ebay, etc. These fraudulent emails look like they are from the "real" company, and generally try to get you to log into your account through the links in the email. The spoof email may state that there is a problem with your account and if you do not log in and update your information your account may be suspended, restricted, closed, etc. Generally these emails try to convey a sense of urgency; if you don't correct this problem your account will be suspended.

Trojans are increasingly being used as a phishing technique according to Sophos, a security firm. The Brizilian police recently arrested a phishing gang of 18 people who stole $37M from online banking accounts. This phishing gang would send out emails that included Trojans. Once a Trojan infects your computer, all internet activity can be monitored and transferred to the phisher. This is a serious threat as you probably won't know that you are infected with a Trojan.

According to David Jevans, Chairman of APWG, "Attacks can, and are, coming in a variety of other flavors. Instant Messaging, exploited websites, P2P networks, and search engines are all being used to download and run key logging malcode and/or be directed to websites which may contain malcode or be fraudulent. Attackers are also not just interested in username and password access to bank accounts. Social security numbers, credit cards and other identity information are also being stolen."

Protecting yourself against phishing scams.

? Do not give out personal or financial information through an email request.

? Always log on to your sensitive accounts by opening a new browser and typing the actual URL directly into the address bar. For example, if you receive a suspected phishing email from ebay, open a new browser and type in the browser bar.

? Do not click on any link in a suspected phishing email.

? Only use a secure website to submit sensitive data. A secure sites' address will begin with "https://" instead of "http://"

? Check the activity of your online accounts regularly.

? Make sure your browser is up to date and all security patches are installed.

? Report phishing and spoof email to: [email protected] , [email protected], and forward the email to the company that is being spoofed.

? Keep your pc protected with updated anti-virus software, anti-spyware software, and a firewall.

? You may also want to install anti-phishing software.

o Earthlink ScamBlocker is a free browser toolbar that alerts you to known phishing sites. It's free and can be downloaded at

o Webroot has a beta version of PhishNet which you can download at

o PC Tools Spyware Doctor offers protection against known phishing sites, spyware and blocks popups.

With the consequences being identity theft, it is imperative that you learn to protect your pc and your identity by exercising caution and installing the proper tools. Hopefully, this identity theft article has given you the information you need to avoid being the next phishing victim. Remember, legitimate companies don't ask for personal or financial information in an email ? so don't give it to them!

Lisa Smith is the webmaster of This website offers information on spyware, adware, internet safety, indepth reviews, and news.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


'Too inconvenient': Trump goes rogue on phone security
President Donald Trump uses a White House cellphone that isn't equipped with sophisticated security features designed to shield his communications, according to two senior administration officials — a departure from the practice of his predecessors ...
Trump reportedly ignores 'inconvenient' security rules to keep tweeting on his iPhoneThe Verge
Trump refuses security measures for his iPhone: reportMarketWatch
Trump's cellphones reportedly lack 'sophisticated security features'New York Post
The Hill -Engadget -Albuquerque Journal -Vox
all 125 news articles »


Spectre chip security vulnerability strikes again; patches incoming
Since the CPU vulnerabilities Spectre and Meltdown showed an entirely new way to attack systems, security experts knew it was only a matter of time until new assault methods would be found. They've been found. Jann Horn, a Google Project Zero security ...
Processor Makers Confirm New Security Flaws, So Update Your Shit ...Gizmodo
Intel details fourth Spectre-style CPU security flawEngadget
Google, Microsoft find another Spectre, Meltdown flawCNET
Microsoft Security Update Guide -Intel Newsroom -Intel -YouTube
all 37 news articles »

Digital Trends

The Ooma Butterfleye security camera keeps recording even in a power outage
Digital Trends
A power outage won't mean a security outage. At least, not if you have Ooma on your side. The smart home company introduced a new video security camera that boasts facial recognition, offline recording, and a host of other features to help keep you and ...

Findlay school board weighing security measures
The Courier
Ideas include adding security personnel throughout the district — currently they're based at the high school and go elsewhere as needed — and employing mental health “liaisons” who would work in schools and with “outside agencies,” Kurt said at ...

Washington Post

They would wound our security to save the president's skin
Washington Post
When one exposes an asset's identity, lives are put at risk and American national security is damaged in the short- and long-term. (What government or individual is going to go out on a limb to protect the United States?) Former CIA director Michael ...

Us Weekly

Royal Police Expert Explains How Duchess Meghan Will Get Special Security Training Now That She's a Royal
Us Weekly
“The British style of security is relatively low-key though, with her protection officers especially trained to blend in to all sorts of environments,” Jagger notes. “Whilst on official public duties with Prince Harry, she will receive a high security ...


Eau Claire school board urges security upgrades for Roosevelt Elementary School
A decision about whether to build a new Roosevelt Elementary School won't come until after Eau Claire school district school population projections are more complete, but school board members said security upgrades at the school should happen sooner ...

and more »

Geneva County Schools adding armed security to schools in the fall
If you have a child in the Geneva County School System, expect to see security on campus in the fall. The school system announced they will have armed security personnel on school campuses. The superintendent says it's a security measure they've been ...

and more »

Foreign Policy (blog)

Security Brief: Trump Has Second Thoughts on DPRK; Pompeo's 'Plan B' for Iran
Foreign Policy (blog)
Late last week, North Korean officials threatened to pull out of the summit planned for June 12 in Singapore after picking up on comments by National Security Adviser John Bolton that the U.S. favors a “Libyan model” for North Korea — one that left ...
'I Think It's Dead:' Nat'l Security Expert Doubts Trump-Kim Summit Will HappenFox News Insider

all 1,093 news articles »
Google News

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More


NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More