Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.

    In The News:

    Milo Yiannopoulos' security cost UC Berkeley $800,000 | Far Right ...
    US university grappling with budget cuts and layoffs spends sum on security for far-right speaker's 15-minute rally.

    and more »


    Source: Deloitte Breach Affected All Company Email, Admin Accounts
    Krebs on Security
    In its statement about the incident, Deloitte said it responded by “implementing its comprehensive security protocol and initiating an intensive and thorough review which included mobilizing a team of cyber-security and confidentiality experts inside ...
    One of the World's Biggest Accounting Firms Hacked After Basic Security GoofGizmodo
    Industry reactions to the Deloitte cyber attackHelp Net Security

    all 88 news articles »


    Microsoft adds new Microsoft 365 versions, plus security and management features
    Microsoft is adding new Microsoft 365 bundles, and adding more features to these integrated Windows, Office 365 and Enterprise Mobiity + Security management and security subscription offerings. Microsoft introduced Microsoft 365 at its Inspire ...
    Microsoft looks to the cloud to expand its security offeringsTechCrunch
    Ignite 2017: Improving Security via the Microsoft's Intelligent Security GraphWindows IT Pro

    all 188 news articles »


    Security Concerns Again Hang Over Winter Olympics
    The PyeongChang 2018 Olympic medals during their unveiling at a ceremony in Seoul on Sept. 21. (Photo by JUNG YEON-JE/AFP/Getty Images). North Korea ramped up its vitriol on Monday, undoubtedly increasing concerns by athletes who are preparing ...
    South Korean Olympic chief downplays security

    all 48 news articles »


    SEC Says It Told US Security Officials of Hack Months Ago
    The U.S. Securities and Exchange Commission told government cybersecurity officials about a hack into its database of corporate filings soon after it happened last year, months before the agency's new chairman made the breach public. Since disclosing ...

    and more »

    Daily Signal

    Trump's New Travel Ban Is Standard Security Policy
    Daily Signal
    President Donald Trump's latest travel executive order restricts travel from seven countries that are known state sponsors of terrorism or have failed to work effectively with the U.S. against emerging threats. (Photo: Jonathan Ernst/Reuters /Newscom) ...
    President Trump's New Travel Executive Order Has Little National Security JustificationCato Institute (blog)
    White House expands travel ban, restricting visitors from eight countriesWashington Post

    all 835 news articles »

    Cleveland Browns security guard robbed at gunpoint near FirstEnergy Stadium
    Darnell Hurt, an employee at Contemporary Services Corporation, which provides security for the Browns, said he was walking to the stadium to catch a bus that would take him and other employees to Indianapolis where they would provide security for the ...


    Report: Security hole in macOS Keychain puts passwords at risk
    Apple released macOS High Sierra on Monday, so it should be a nice way to spotlight the Mac this week after last week's iOS 11 and iPhone 8 releases. But a report by a security researcher at Synack puts a bit of a damper on the High Sierra release.
    macOS High Sierra Automatically Performs Security Check on EFI Firmware Each WeekMac Rumors
    Ex-NSA hacker drops macOS High Sierra zero-day hours before launchZDNet
    High Sierra validates Mac firmware weekly, alerts users to possible security issuesAppleInsider (press release) (blog)

    all 106 news articles »

    East Bay Times

    Safeway adds security, OKs arresting trespassers at downtown Concord store
    East Bay Times
    15 letter to Mayor Laura Hoffmeister, the supermarket chain responded to the city's concerns about shoplifting, trespassing and security at the downtown grocery store. Safeway confirmed plans to paint the building's exterior, evaluate the parking lot ...

    and more »

    Church shooting suspect worked for security company less than 12 hours before Antioch attack
    NASHVILLE, Tenn. (WKRN) – The man arrested for the deadly shooting at an Antioch church Sunday applied for a security guard license Friday before the attack, and worked as a security guard Saturday night . Emanuel Samson attended a class for ...
    Antioch Church Gunman Attended Unarmed Security Training Class Before
    Alleged Antioch church gunman tried to renew security license days before shootingWZTV

    all 618 news articles »
    Google News

  • Crack The Code - Thats A Direct Challenge

    I Challenge You To Crack The Code ------------------------------------- I had... Read More

    How to Protect Yourself Against Online Criminals

    Credit card fraud is a growing problem for online businesses... Read More

    How To Clean the Spies In Your Computer?

    Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

    Eliminate Adware and Spyware

    Everyone should eliminate spyware and adware from your hard drive... Read More

    Top Five Spyware Fighting Tips

    Spyware and adware are becoming major problems for online surfers... Read More

    Dont Get Hacked - A Guide to Protecting Your Business from Thieves

    You've seen it in the news - 40 million credit... Read More

    Top 10 tips for Safe Internet Shopping

    Over £5 billion pounds was spent on online shopping in... Read More

    Internet Privacy

    Over the past few years as the internet has become... Read More

    Why Corporations Need to Worry About Phishing

    Phishing is a relatively new form of online fraud that... Read More

    Hacking Threats and Protective Security

    The 1998 Data Protection Act was not an extension to,... Read More

    Identity Theft - Dont Blame The Internet

    Identity theft ? also known as ID theft, identity fraud... Read More

    Fishing for Fortunes. Scam!

    Spelt phishing, but pronounced as above, this despicable act is... Read More

    Hacked: Who Else Is Using Your Computer?

    A friend called me one day and asked if I... Read More

    Web Browsing - Collected Information

    You may not realize it, but as you are surfing... Read More


    P C. owners are constantly at risk from attacks by... Read More

    Breaking Into Your PC: News...

    You'd better learn news from media, not from emails, security... Read More

    8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

    The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

    Mail Forwarding - Why Would You Do It?

    First of all we need to get some terms stated.... Read More

    Spyware Removal

    Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

    Hacking the Body Via PDA Wireless Device

    First I would like to stress I am condoning the... Read More

    How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

    If you use the internet, you have probably been infected... Read More

    With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

    High-tech private investigators are becoming the answer for many Internet... Read More

    What Every Internet Marketer Should Know About Spyware

    If you run any type of Internet business, Adware and... Read More

    An Open Door To Your Home Wireless Internet Network Security?

    This is not some new fangled techno-speak, it is a... Read More

    Are They Watching You Online?

    When surfing the Internet you probably take your anonymity for... Read More