Phishing - Identity Theft & Credit Card Fraud

What is Phishing?
Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of social engineering, by posing as a different person or organization that you already trust.

How does Phishing Work?
The most common form of Phishing is done by sending out fraudulent e-mails, that lead back to websites that look legitimate. Normally an e-mail is sent to a huge amount of people stating in very general terms that you should come to their website and update your information, or provide them with some new information they need, or some other similar excuse. When you click on the link in the e-mail it will take you to a website that looks very similar to the one you are expecting, you enter your information, and now they've got you. Another method is to open a popup windows asking information, on top of the real legitimate website.

How can I identify a scam e-mail?
There are several major things to look out for that will lead you to believe the e-mail is fraudulent. Quite often the e-mails will be HTML based, not plain text, this allows them to put active links that display a legitimate website, but the coding behind it takes you to a different website.

Often new websites are registered with altered spellings of major corporations and organizations, or the link will lead directly to an IP address (ie 24.38.122.156) instead of a website domain (ie www.website.com).

Another very quick way to identify a false e-mail is to see who it is address to. Normally e-mails that are fraudulent in nature are addressed to "Dear Customer" as opposed to your real name, and often they are e-mailed to many users at one time.

No legitimate organization should ever ask you to provide you with personal information via e-mail. If any e-mail ever asks you to e-mail them your private information, you should report this e-mail to the company they are posing as.

How can I avoid falling for a Phishing scam?
If you believe the e-mail could be legitimate, don't click on the link in the e-mail, instead open up your web browser, and use the link/favorite you already have, or type in the website yourself in to the URL box. This will guarantee that you are using the correct legitimate website!

Using the same method to get to the website as mentioned above, go to the organizations help page or contact page and ask them about the e-mail they may have sent you. You can also forward them the e-mail to a known legitimate e-mail address at their organization.

What if I already fell for this scam?
If you have mistakenly been taken in by this kind of scam there is several very important steps you need to take. First, report that you have been tricked by this method to your credit card companies, and other financial institutions.

Report that you have been tricked to the company that you thought you were legitimately updating information for. If you can provide them with the e-mail that tricked you, it may be useful for helping to reduce the impact on other people around the world.

Change all your passwords and PIN numbers for all your financial institutions and websites immediately.

Monitor your credit card statements, financial slips and balances. If you notice a discrepancy, immediately contact your financial organization and let them know about the fraudulent activity. In addition most banks should be able to add you to a fraud report list that will stay on your credit report that will make it harder for people to create new credit cards or open accounts without providing legitimate identification in person. Finally, you should contact your local police or law enforcement organization and file an incident report to cover yourself should illegal activities happen!

Ken Dennis http://KenDennis-RSS.homeip.net/

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

SFGate

Bitcoin a shadowy realm as US weighs security clearances
SFGate
"There are a lot of good things about cryptocurrencies, but at the same time there are these security risks," said Param Vir Singh, director of the PNC Center for Financial Services Innovation at Carnegie Mellon University. "Think about a knife: It ...


WIRED

Security News This Week: T-Mobile Web Portal Exposed 74 Million Accounts
WIRED
T-Mobile has about 74 million customers, and the company added a credential login to protect the tool after receiving the alert from security researcher Ryan Stevenson. Per its bug bounty program, T-Mobile awarded Stevenson $1,000 for the discovery.


Washington Post

Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reports
Washington Post
The round-the-clock security detail for Environmental Protection Agency Administrator Scott Pruitt cost taxpayers almost $3.5 million during his first year in office, according to figures published Friday by the agency. The EPA spent more than $2.7 ...
EPA spent $3.5 million to protect Scott Pruitt, nearly twice the typical security costCNBC
EPA chief's security bill soars, agency cites death threatsReuters
EPA spent nearly $3.5M on Pruitt security - CNNPolitics - CNN.comCNN
CBS News -ABC News -Politico -Politico
all 118 news articles »

WBAL Baltimore

Security guard fatally shoots man in Catonsville
WBAL Baltimore
A security guard fatally shot a man who fired his own gun after refusing to leave a Catonsville business Saturday, Baltimore County police said. County police said security guards were asking people to leave the parking lot because the business was closed.
Man killed after gunfire exchange with security guard at Catonsville ...Fox Baltimore

all 9 news articles »

Voice of America

Top Afghan Security Officials Visit Pakistan for Crucial Talks
Voice of America
A high-level Afghan delegation began a daylong official visit to neighboring Pakistan Sunday to discuss bilateral matters, border management and regional security. Afghan National Security Adviser Haneef Atmar is leading a team of top security ...
Afghan, Pakistani Security Officials Meet In IslamabadRadioFreeEurope/RadioLiberty

all 19 news articles »

South China Morning Post

Nato's second-in-command to address Asia security forum as North Korea looms large
South China Morning Post
Nato Deputy Secretary General Rose Gottemoeller will attend a major security forum in Asia next month, aiming to bolster the Western alliance's ties with the region amid lingering fears about North Korea's nuclear ambitions, a diplomatic source said on ...


Kansas City Star (blog)

Security of the midterm elections needs attention now
Kansas City Star (blog)
When top intelligence officials went to Capitol Hill one morning last week to give House members a classified briefing on the security of the upcoming elections, only 40 or so bothered to show up. In other words, nine out of 10 lawmakers thought they ...
Homeland Security announces 15000 additional seasonal visas for companies at risk of failureThe Hill
Homeland Security issues 15000 more H-2B visas amid crab industry labor shortage in Maryland, elsewhereBaltimore Sun
Homeland Security releases 15000 additional H-2B visasThe Boston Globe
UPI.com -Paulick Report
all 79 news articles »

Middle East Monitor

Iran security forces to confront unrest that serves US
The Jerusalem Post
"Judicial and security bodies ... will resolutely confront any group or individual that wants to compromise the country's security," said Gholamhossein Mohseni Ejei, the judiciary's news website Mizanonline reported, adding that fomenting unrest was ...
Iran says security forces to clamp-down on protestsReuters

all 3 news articles »

FOX 4 News

Downtown Dallas security team stepping up patrols after violent attacks
FOX 4 News
The Downtown Dallas security team is increasing its patrols after a woman was violently robbed and other recent crimes. Red Ledbetter was walking home with a friend around 3:30 Tuesday morning when three men attacked and robbed them near Ervay ...

Google News

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More