Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Identity Theft ? Beware of Phishing Attacks! > NetSparsh - Viral Content you Love & Share

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a link that I can follow in order to fill out an online form confirming my identity. It's certainly nice that Bank of the West is worried about the status of my account. There's just one problem ? I don't have an account at Bank of the West. In fact, I've never even heard of Bank of the West.

This message is an example of "phishing", a relatively new problem found on the Internet. Unscrupulous individuals are sending spam e-mail messages by the millions, purporting to be from credit card companies, PayPal, eBay, or banks. Each message warns the recipient of questionable activity on his or her account, as asks that the recipient click on a link to verify personal information. The requested information is usually a username or password. Sometimes it's a credit card number and expiration date. These messages are almost always fraudulent, and consumers are falling for them by the thousands. The messages certainly look legitimate, and often mimic the style of the legitimate company's messages exactly. How can you tell the difference between a real message from your bank and a fake one designed to steal your identity?

There are several tips to help identify phishing expeditions. The first is the greeting. "Dear valued customer" is an odd greeting from a company that has a database that contains your name, address, Social Security number and credit card. Any company with whom you do business that legitimately wants to contact you will probably do so by name. Look for misspelled words. Phishing expeditions often come from foreign senders who often mangle the English text of the message rather badly, combining both bad grammar and bad spelling. Check the links in the messages. The link may say www.eBay.com, but if you move your mouse over the link, you may see something like "htttp://200.118.105?" on the bottom line of your e-mail program, indicating that the link is a fake. Should you click on the link, you'll be taken to a page that looks just like the real Website, but why take the chance?

If you need to contact your bank, credit card company, or online auction house, either go to their Website directly or call them. Never click on a link in a message that threatens you with account suspension; if a company with whom you do business has issues with your account, they will probably contact you by phone or mail. These individuals who use these phishing tips are getting more clever all the time. It pays to be suspicious. If you aren't, you may end up a victim of identity theft.

©Copyright 2005 by Retro Marketing. Charles Essmeier is the owner of Retro Marketing, a firm devoted to informational Websites, including End-Your-Debt.com, a site devoted to debt consolidation and credit counseling, and HomeEquityHelp.com, a site devoted to information regarding home equity lending.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Security, privacy experts weigh in on the ICE doxxing
TechCrunch
In what appears to be the latest salvo in a new, wired form of protest, developer Sam Lavigne posted code that scrapes LinkedIn to find Immigration and Customs Enforcement employee accounts. His code, which basically a Python-based tool that scans ...
Trump signs executive order on immigration, but says 'zero tolerance' will continueUSA TODAY
GitHub, Medium, and Twitter take down database of ICE employee LinkedIn accountsThe Verge
Federal agencies continue to advance capabilities with Azure Government – Azure Government CloudMSDN Blogs - Microsoft
GitHub
all 42 news articles »

EFF

Journalists and Digital Security: Some Thoughts on the NYT Leak Case
EFF
The leak investigation involving a Senate staffer and a New York Times reporter raises significant issues about journalists, digital security, and the ability of journalists to protect confidential sources. The New York Times recently revealed that the ...


BBC News

Venezuela crisis: UN says security forces killed hundreds
BBC News
Venezuelan security forces have carried out hundreds of arbitrary killings under the guise of fighting crime, the UN's human rights body says. In a report, it cites "shocking" accounts of young men being killed during operations, often in poor ...
Killings by security forces rife in Venezuela, rule of law 'virtually absent': UNReuters
Venezuelan security forces killed 'hundreds', rule of law 'virtually absent', UN saysTelegraph.co.uk

all 221 news articles »

Los Angeles Times

Protesters gather outside Homeland Security Secretary Kirstjen Nielsen's home
Los Angeles Times
About two dozen people gathered Friday morning outside the Virginia home of Homeland Security Secretary Kirstjen Nielsen in response to the Trump administration's policy on separating children from their parents at the border. According to an organizer ...
Homeland Security Secretary Kirstjen Nielsen heckled outside her homeKGO-TV
DHS Secretary Nielsen casts immigration crisis as 'a national security issue'ABC News
Shaheen calls for Homeland Security secretary's resignationConcord Monitor

all 1,741 news articles »

Security Intelligence (blog)

Why Security Skills Should Be Taught, Not Hired
Security Intelligence (blog)
Chief information security officers (CISOs) across the globe have long lamented the fact that so many job applicants lack the security skills they need to fill crucial security positions. Put bluntly: IT leaders have simply failed to create a pipeline ...


Digital Trends

Improving security means killing the password, but that battle has just begun
Digital Trends
(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity. Passwords are often cited as the biggest problem with modern digital security. They're supposed to be complicated, unique, and ever changing, and yet few ...

and more »

Tom's Guide

Millions of Baby Monitors, Security Cameras Easy to Hack
Tom's Guide
In a new report, information-security firm SEC Consult details a vulnerability the snoop might have exploited. If SEC Consult is right, many other baby monitors, security cameras and webcams made by the same manufacturer (hint: it isn't FREDI) might be ...


Wall Street Journal

EU Set to Impose Sanctions on Myanmar Security Officials
Wall Street Journal
The European Union is set to impose sanctions on seven Myanmar military and border guard police officials over the mass expulsion of ethnic Rohingya, according to diplomats, in a sign that EU leaders will go beyond words in punishing Myanmar security ...

and more »

Mac Rumors

Apple iOS Passcode Crack Revealed by Security Researcher. Watch the Exploit in Action
Fortune
An iPhone can be unlocked with a virtual keyboard pretending to type lots of passcodes, a security researcher revealed Friday. By sending all possible four-digit PIN combinations as if they came from a USB keyboard, the cracking method bypasses Apple's ...
Security Researcher Discovers Method for Brute Forcing iPhone Passcode in iOS 11Mac Rumors

all 74 news articles »

The National Security Law Podcast: It's a Girl!
Lawfare (blog)
A quick run-down of other DOJ national security developments this week includes new charges against a man allegedly responsible for leaking the CIA “Vault 7” materials to Wikileaks and also a Wisconsin woman who allegedly hacked the social media ...

Google News

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More