Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from http://Identity-Theft-Prevention-Guide.com

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.
    Visit: http://Identity-Theft-Prevention-Guide.com

    In The News:


    Kitsap Sun

    OC launches investigation of security director
    Kitsap Sun
    BREMERTON — Olympic College has launched an investigation of complaints against its director of campus safety in light of a vote of no confidence by the union representing security guards. The vote, taken in mid-January, showed 88 percent of members ...


    The Sun

    Security services knew of glaring weakness in Parliament security after 'war game' simulating attack on Westminster ...
    The Sun
    SECURITY services were aware of gaps in Parliament's security after a simulated attack ended with most MPs being killed, it has been claimed. A source quoted by the Sunday Times claimed a “table-top” exercise revealed four terrorists with automatic ...
    Security chief told MPs they were safe in parliament before attackThe Guardian
    Urgent review of security gates of Parliament needed after Westminster attackExpress.co.uk

    all 56 news articles »

    The Independent

    Security breach renders in-flight laptop ban useless
    The Independent
    The airport which is the main target of the Government's ban on electronic devices has a security flaw that renders rigorous checks futile, The Independent can reveal. After clearing six separate security hurdles at Istanbul airport, passengers bound ...

    and more »

    Rochester Democrat and Chronicle

    JCC receives $200,000 to improve security - Democrat and Chronicle
    Rochester Democrat and Chronicle
    Funds will be used to upgrade cameras and other measures following two bomb threats at the Brighton facility this month.
    JCC of Rochester gets $200,000 for security enhancements | WXXI ...WXXI News

    all 4 news articles »

    The Independent

    WhatsApp: Scapegoat for London's security lapses
    DEBKA file
    British Home Secretary Amber Rudd Sunday, March 26, attacked WhatsApp for refusing intelligence services and police access to its encrypted messaging service, used by Khalid Masood three minutes before his terrorist rampage in London last Wednesday.
    Ex-cyber security chief says Government is 'using' Westminster attack to grab unnecessary spying powersThe Independent
    WhatsApp security debate must be informed or we will all sufferiNews
    Home Secretary Amber Rudd: Give security services access to WhatsAppThe National

    all 175 news articles »

    Reuters

    Britain reviewing security at parliament after deadly attack
    Reuters
    Interior minister Amber Rudd told the BBC there would be another review of security at the Palace of Westminster, but that such arrangements were continually assessed. "There are constant reviews and updates so that we have the right form of defense in ...
    London attack fuels calls for tighter Westminster securityThe Guardian
    London attack: Parliament security under reviewBBC News
    Questions over Parliament security as motorcyclist rides through gate shortly after terrorist attackTelegraph.co.uk
    Wall Street Journal (subscription)
    all 8,413 news articles »

    The Japan Times

    European security ties 'too precious' for Brexit talks
    The Japan Times
    LONDON – Britain's intelligence expertise may be “too precious” to use as a bargaining tool in the upcoming Brexit talks, experts said, after a terror attack in London highlighted the need for continued European security cooperation. The suggestion ...

    and more »

    New System Estimates Cleveland Airport Security Wait Times
    U.S. News & World Report
    New System Estimates Cleveland Airport Security Wait Times. Cleveland's main airport is developing a system to help travelers more accurately compare wait times at its security checkpoints and better plan their trips. | March 27, 2017, at 12:08 a.m.. MORE.

    and more »

    Huffington Post

    What Don't We Talk About When We Talk About Israel's Security
    Huffington Post
    When Israeli and American Jews talk about “Israel's security” they are thinking about the Holocaust and about extermination. That is the reason they choose the narrowest possible definition of “security,” a strip. Israel's “security” is what we ...

    and more »

    Otago Daily Times

    Ivory Coast rescinds port security measures, attack threat unfounded
    Reuters
    "After compiling the information ... it emerged that the threat is not real," the head of maritime security Colonel Bertin Koffi Tano wrote in a second order to the Abidjan and San Pedro port authorities and shipping companies on Sunday. "I ask that ...
    Ivory Coast boosts port security over attack threatOtago Daily Times

    all 5 news articles »
    Google News

  • Consumers: Shop Online and Get Information Safely

    Do you really have to know how feeds work? Not... Read More

    Is the Internet Insecure Because of You?

    Long gone are the days that we could feel secure... Read More

    Phishing and Pharming: Dangerous Scams

    As soon as almost all computer users already got used... Read More

    Traditional Antivirus Programs Useless Against New Unidentified Viruses!

    Every now and then you can read about a new... Read More

    How To Clean the Spies In Your Computer?

    Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

    Securities

    NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

    Preventing Online Identity Theft

    Identity theft is one of the most common criminal acts... Read More

    Cybercriminals Trick: Targeted Trojan-Containing Emails

    Threats we ordinary Web users face online leave us no... Read More

    The One Critical Piece Of Free Software Thats Been Overlooked

    Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

    Identity Theft - Dont Blame The Internet

    Identity theft ? also known as ID theft, identity fraud... Read More

    IPv6 - Next Step In IP Security

    IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

    How To Cover Your Tracks On The Internet

    Every single time you access a website, you leave tracks.... Read More

    Identity Theft Offline -- So Many Possibilities

    Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

    Viruses and Worms: The Problems and Their Solutions

    History and BackgroundThe virus was one of the first ever... Read More

    Detect Spyware Online

    You can detect spyware online using free spyware cleaners and... Read More

    Personal Firewalls - Secure Your Computer

    There has not been a time in the history of... Read More

    Wells Fargo Report Phishing Scam

    First off I should explain what phishing is. Phishing is... Read More

    3 Things You Must Know About Spyware

    1)Spyware is on your system. Like it or not, statistically... Read More

    Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

    The money being spent online is steadily growing. With billions... Read More

    Make Money Online - Latest Scam Disclosed

    Before we start, I want to make it clear that... Read More

    File Sharing - What You Need to Know!

    File sharing on p2p is soaring despite the music and... Read More

    Network Security 101

    As more people are logging onto the Internet everyday, Network... Read More

    Firewalls: What They Are And Why You MUST Have One!

    A firewall is a system or gateway that prevents unauthorized... Read More

    Information Security for E-businessmen: Just a Couple of Ideas

    If you constantly deal with bank or electronic accounts, it... Read More

    Burning Bridges is Bad, But Firewalls are Good

    When you signed up for that ultra-fast DSL or Cable... Read More