Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing - Learn To Identify It > NetSparsh - Viral Content you Love & Share

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from http://Identity-Theft-Prevention-Guide.com

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.
    Visit: http://Identity-Theft-Prevention-Guide.com

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

    TechCrunch

    Tortuga Logic raises $2 million to build chip-level security systems
    TechCrunch
    Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


    UN News Centre

    At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
    UN News Centre
    17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

    and more »

    New York Post

    Mandalay Bay adds elevator security after Las Vegas shooting
    Las Vegas Review-Journal
    To that end, we have determined that positioning 24-hour security at the elevator banks improves our surveillance capabilities and enhances security for all of our guests and facilities,” MGM Resorts said in the statement. People seeking to get on the ...
    Mandalay Bay adds 24/7 elevator security after gunman's rampageNew York Post

    all 4 news articles »

    KING5.com

    Seattle police plan security for tree lighting ceremony
    KING5.com
    Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...


    New York Times

    Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
    New York Times
    WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
    Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
    Homeland Security official Jamie Johnson resigns after comments ...Washington Post
    Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
    The Grio -New York Daily News -CNN -FEMA.gov
    all 68 news articles »

    Computerworld

    Strong and stable: The iOS security guide
    Computerworld
    So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...
    The iOS 11 privacy and security settings you need to know aboutWired.co.uk

    all 147 news articles »

    UN News Centre

    Security Council fails at fresh attempt to renew panel investigating chemical weapons use in Syria
    UN News Centre
    17 November 2017 – For the third time in two days, the United Nations Security Council on Friday failed to adopt a resolution on the mandate of an international panel investigating use of chemical weapons in Syria due to a negative vote by permanent ...
    Security Council Considers 30-day Extension on Syria ExpertsVoice of America
    The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME
    Security Council Fails for Fourth Time to Renew Mandate of Joint Mechanism Investigating Chemical Weapons Attacks ...ReliefWeb

    all 521 news articles »

    WFTV Orlando

    Investigators testify in downtown Orlando security guard's murder trial
    WFTV Orlando
    ORLANDO, Fla. - Crime scene investigators testified Friday in the murder trial of a man accused of raping and killing a 27-year-old woman at her downtown Orlando apartment. Police said Stephen Duxbury strangled Sasha Samsudean in October 2015 at the ...
    Jurors hear from print experts in security guard's murder trialOrlando Sentinel

    all 5 news articles »

    Houston Chronicle

    Ex-Homeland Security secretary recovering from heart attack
    Houston Chronicle
    Ridge was the nation's first homeland security secretary, serving under Republican President George W. Bush until February 2005. He left the governorship after the terrorist attacks of Sept. 11, 2001, to join the Bush administration. Since leaving ...
    Ex-Homeland Security Czar Ridge Hospitalized After Heart AttackVoice of America
    Former Pennsylvania Governor and U.S. Homeland Security ...WTAE Pittsburgh
    Former Head of US Homeland Security Ridge in Critical ConditionU.S. News & World Report
    Fox News -Austin American-Statesman
    all 105 news articles »

    Tampabay.com

    Cyber firm accesses CentCom cloud information, gives command low security score
    Tampabay.com
    Vickery said he notified the military about the security loophole as soon as it was discovered. He said he would "not be surprised" if someone besides him accessed the information, but Army Maj. Josh Jacques, a command spokesman, said it appears no one ...

    and more »
    Google News

  • Watch Out For That Scam

    The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

    New Mass Mailing Spamming Internet Trojan for the Windows Platform

    May. 16th 2005 - MicroWorld has reported the discovery of... Read More

    Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

    Is your enterprise following the rules?The bulk of financial information... Read More

    New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

    In 1997, I decided after 15 years as a practicing... Read More

    Securing Your Accounts With Well-Crafted Passwords

    In the past I've never really paid much attention to... Read More

    8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

    The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

    SCAMS ? Be Aware ? And Report When Necessary

    The Internet is a vast International Network of people and... Read More

    I Spy...Something Terribly Wrong (In Your Computer)

    This really chapped my lips...I recently bought a new computer.... Read More

    The Important Steps To Protect Your Kids on the Internet

    Internet is the ocean of knowledge. In this ocean you... Read More

    Reclaim Your PC from the Internet Spies

    Viruses are, however, not the only malicious software programs out... Read More

    Internet/Network Security

    Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

    How to Get Rid of New Sobig.F Virus?

    As you know, this time the virus under the name... Read More

    Three-pronged Trojan Attack Threatens Security on the Internet

    Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

    Are They Watching You Online?

    When surfing the Internet you probably take your anonymity for... Read More

    The Saga of the Annoying Adware

    When we think of adware, what comes to mind are... Read More

    How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

    If you use the internet, you have probably been infected... Read More

    Its Time to Sing the Encryption Song - Again!

    Yes, I'm wearing my encryption hat again. Why you may... Read More

    Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

    1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

    Information Security for E-businessmen: Just a Couple of Ideas

    If you constantly deal with bank or electronic accounts, it... Read More

    Dont Allow Hackers to Take Out Money from Your Bank Account

    If you know what is the 'Fishing' then it's very... Read More

    An Open Door To Your Home Wireless Internet Network Security?

    This is not some new fangled techno-speak, it is a... Read More

    Behavior to Stay Safer Online

    1. Importance of a Virus Scanner: A Antivirus program can... Read More

    Computer Security

    What is computer security? Computer security is the process of... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    Phishing ? Its Signs and Your Options

    Phishing is the act of some individual sending an email... Read More