Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing - Learn To Identify It > NetSparsh - Viral Content you Love & Share

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from http://Identity-Theft-Prevention-Guide.com

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.
    Visit: http://Identity-Theft-Prevention-Guide.com

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

    NPR

    Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny
    NPR
    "Election officials have been doing a ton around election security, but if that same thing isn't going on at the vendor level, then that creates a really big potential vulnerability for the entire system," said Edgardo Cortéz, an election security ...

    and more »

    WOAI

    Security guard nearly run over after stumbling onto drug deal
    WOAI
    SAN ANTONIO - A security guard is nearly run over after breaking up a drug deal on Perrin Central near Perrin Beitel and Wurzbach Parkway. Police said that about 1 a.m. Friday the guard saw four people in the parking lot of the Oak Springs Apartments ...

    and more »

    Politico

    NSA: Security breaches of hacking tools curtailed snooping
    Politico
    The National Security Agency shut down expensive and vital operations as a result of top secret information being spirited out of its headquarters by a fired NSA computer engineer who claims he took the sensitive records home to work on bolstering his ...


    Mashable

    A woman accosted a security guard with a fanny pack containing a pigeon
    Mashable
    A well-planned surprise can be an absolute joy. A surprise birthday party? So much fun! An unexpected gift? Yes, please! A surprise pigeon? Hard pass. Following an altercation with employees at a Social Security Administration office in Virginia on ...
    Woman hits security guard with fanny pack containing pigeon, police sayMyPalmBeachPost
    Woman pulls knife on security guard, hits him with fanny pack that had pigeon insideWashington Post
    Woman pulls knife on security guard, then hits him with bag that had pigeon insideThe Independent

    all 37 news articles »

    WIRED

    Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer
    WIRED
    The internet's decentralized nature means that the clocks behind every web browser and web application can actually have major discrepancies, which in turn can undermine security protections. In a step toward addressing these inconsistencies, the ...


    The Verge

    Amazon is turning the Echo into a security system
    The Verge
    Amazon is adding a few new features to the Echo that turn it into one of the basic pieces of a smart security system. Since Echo speakers are always listening, they'll be able to start listening for the sound of broken glass, or for a smoke or carbon ...
    Alexa Guard turns Echo products into security devicesTechCrunch
    Alexa Guard makes your Echo a home security deviceEngadget
    ADT and Amazon Team Up to Provide Customers With New Home Security FeaturesNasdaq

    all 2,304 news articles »

    USA TODAY

    Terrorism task force investigating 'security breach' at Orlando Melbourne airport
    USA TODAY
    MELBOURNE, Fla. – The Joint Terrorism Task Force is overseeing the investigation into an overnight incident involving a man suspected of hopping a fence at the Orlando Melbourne International Airport and boarding a vacant American Airlines Airbus in a ...
    Student with pilot's license arrested after security breach at Melbourne International AirportWFTV Orlando
    Orlando Melbourne International Airport security breach: What we knowFlorida Today
    Officials ID student pilot accused of breaching Florida airport securityNews 13 Orlando
    SpaceCoastDaily.com -Palm Beach Post -Florida Today
    all 1,042 news articles »

    The State of NAIC's Data Security Model Law
    Insurance Journal
    Most states have yet to adopt a cyber security model law for the insurance industry like the one approved by the National Association of Insurance Commissioners in 2017, but one expert believes the industry should be prepared for what he sees as an ...


    ZDNet

    SingHealth data breach reveals several 'inadequate' security measures
    ZDNet
    Investigation into Singapore's most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations. The findings were revealed on the first day of hearings led by ...

    and more »

    CIO

    Pentagon CIOs struggle with legacy tech, security. Sound familiar?
    CIO
    Flanders, CIO of the Defense Health Agency, is gearing up to consolidate control over the Pentagon's sprawling network of treatment centers, in the process centralizing a far-flung set of IT operations that raise a host of security and device ...

    Google News

  • Personal Firewalls for Home Users

    What is a Firewall?The term "firewall" illustrates a system that... Read More

    What is Hacking? Are You a Hacker?

    WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

    Network Security 101

    As more people are logging onto the Internet everyday, Network... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    Corporate Security for Your Home Business

    The words Corporate Security may conjure up images of a... Read More

    Identity Theft - Dont Blame The Internet

    Identity theft ? also known as ID theft, identity fraud... Read More

    Spyware Symptoms

    Spyware symptoms happen when your computer gets bogged down with... Read More

    Social Engineering: You Have Been A Victim

    Monday morning, 6am; the electric rooster is telling you it's... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    Data Security; Are Your Company Assets Really Secure?

    Is your data secure? Think again. Securing data is unlike... Read More

    8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

    Ebay is a great site and is used by many... Read More

    If You Sell Anything Online Your ePockets Are Being Picked

    You and I are a lot alike. We are both... Read More

    Email Scams ? Ten Simple Steps To Avoiding Them

    According to the Anti-Phishing Working Group (APWG) email scams also... Read More

    New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

    In 1997, I decided after 15 years as a practicing... Read More

    Detect Spyware Online

    You can detect spyware online using free spyware cleaners and... Read More

    How to Protect Yourself Against Online Criminals

    Credit card fraud is a growing problem for online businesses... Read More

    Dont be a Dork ? Protect Yourself

    There are folks out there who use their powers for... Read More

    Arming Yourself Against Spyware

    While clicking from site to site on the internet you... Read More

    Dont Miss Information Because of Misinformation

    It has been said that with the wealth of information,... Read More

    Social Engineering - The Real E-Terrorism?

    One evening, during the graveyard shift, an AOL technical support... Read More

    Online Cell Phone Scams and Spam

    They're out there. Individuals trying to make a quick buck... Read More

    Are You Surfing Safe?

    Ok, you've got a computer, and you get online. You... Read More

    5 Tips For An Unbreakable Password

    Despite the current wave of identity theft and corporate security... Read More

    Dialing Up a Scam: Avoiding the Auto-Dialer Virus

    For many, the daily walk to the mailbox evokes mixed... Read More

    Fishing for Fortunes. Scam!

    Spelt phishing, but pronounced as above, this despicable act is... Read More