Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Cyber Crooks Go Phishing > NetSparsh - Viral Content you Love & Share

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.

But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse.

"Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more.

Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet.

Here's the basic pattern for a "phishing" scam...

You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity.

In the email it tells you that something bad is about to happen unless you act quickly.

Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name.

In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up.

Once you give up your information... it's all over but the crying!

After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse.

An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers.

In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal.

They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it.

Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account.

This new "phishing" style scam works extremely well for 2 basic reasons.

First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking.

Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional frenzy.

The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense.

Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox.

If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think!

Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling.

Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it.

Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com).

Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate.

Above all remember this:

Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information.

They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details.

About The Author

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.TurnWordsIntoTraffic.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

USA TODAY

Amid outrage, Homeland Security chief Kirstjen Nielsen 'will not apologize' for separating families
USA TODAY
Border agents watch as protesters on the Mexico side of the border demonstrate against policies of President Trump while Homeland Security Secretary Kirstjen Nielsen tours a border fence construction site on April 18, 2018 in Calexico, Calif. (Photo ...
Homeland Security chief slams 'irresponsible' reports on separation ...ABC News
Homeland Security chief defends separating families at borderNew York Post
Here's a Dishonest Tweet from Secretary of Homeland Security Kirstjen Nielsen and Also Five LimericksSlate Magazine
The Hill -VICE News -New York Daily News -Twitter
all 352 news articles »

3 Tips for Driving User Buy-in to Security Policies
Dark Reading
That's why teaching users why it's important to commit to security policies and controls is a far more effective strategy than simply demanding that they follow them. For example, relaxing rules, gamifying education and testing, or simply explaining ...


NPR

Bureaucracy And Politics Slow Election Security Funding To States
NPR
When Congress approved giving $380 million to states to bolster the security of their elections, state officials were caught off guard but extremely grateful. Elections are notoriously underfunded and haven't seen a windfall like this from the federal ...


ZDNet

Lack of collaboration, disclosure affecting APAC security posture
ZDNet
Businesses in Asia-Pacific still are not exchanging enough information and disclosing breaches in a timely fashion. In fact, threat actors are "out-evolving" the industry not necessarily because they are smarter, but because they are collaborating more ...


Homeland Security Secretary Nielsen Defends 'Zero Tolerance' Border Policy
NPR
Homeland Security Secretary Kirstjen Nielsen addresses the Trump administration's "zero tolerance" policy that is separating families who cross the border illegally. Facebook; Twitter; Flipboard; Email ...


TechCrunch

Email security startup Tessian raises $13M led by Balderton and Accel
TechCrunch
Tessian (formerly called CheckRecipient), the London-based startup deploying machine learning to improve email security, has raised $13 million in Series A funding. Leading the round is Balderton Capital, and existing backer Accel. A number of previous ...

and more »

Reuters

Huawei to Australia: We're not a security risk for 5G
CNNMoney
Australian wireless carriers will soon need to hire companies to build new superfast mobile networks. But Huawei faces opposition from Australian national security agencies, according to reports last week from outlets including the Australian Financial ...
China's Huawei rebuts Australian security concerns amid Sino-Canberra tensionsReuters
Huawei rejects Australia security concernsBBC News
US warns Malcolm Turnbull not to use Huawei for 5G networkThe Australian Financial Review
The Australian Financial Review -The Strategist -Huawei Australia Hub
all 151 news articles »

Chron.com

Cyber security rules needed for pipelines: FERC commissioners
Chron.com
Although FERC has the authority to issue certificates for new interstate gas pipelines and set their rates, the Commission does not have responsibility for pipeline security. That charge falls to the Transportation Security Administration, the same ...


TechCrunch

F-Secure to buy cyber security firm MWR
Reuters
HELSINKI, June 18 (Reuters) - Data security company F-Secure said on Monday it had agreed to acquire Britain-based MWR InfoSecurity for 80 million pounds ($106 million) in cash to widen its range of cyber security services. The Finnish company, which ...
F-Secure to buy MWR InfoSecurity for ~$106M+ to offer better threat huntingTechCrunch
F-Secure acquires MWR InfoSecurityHelp Net Security

all 27 news articles »

Just Security

Just Security Authors and Yemeni Human Rights Leaders Detained by Saudi-Led Forces on Travel to Humanitarian ...
Just Security
They have also authored numerous posts on Just Security, including about a letter Mwatana sent to U.S. business leaders regarding Saudi abuses, the need for an international inquiry into abuses in Yemen, and about flaws in U.S. investigation processes.

Google News

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More