Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing - Learn To Identify It > NetSparsh - Viral Content you Love & Share

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

    New York Times

    No Passport or Ticket: How a Woman Evaded Airport Security and Flew to London
    New York Times
    After Ms. Hartman joined the security line and was screened by the T.S.A., she tried to board a flight to Connecticut around 2 p.m., attempting to conceal herself behind a passenger who was waiting in line, Ms. Simonton said. As Ms. Hartman tried to ...
    How Marilyn Hartman Got Past O'Hare SecurityCBS Chicago
    'Serial stowaway' arrested for 10th time after slipping past airport security, flies to LondonFox 2 Detroit
    Notorious 'serial stowaway' pensioner evades airport security and flies from Chicago to London without a ticketEvening Standard

    all 29 news articles »

    Google's Advanced Protection Program Offers Security Options For High-Risk Users
    Security is not a one-size-fits-all proposition, and features that are prohibitively inconvenient for some could be critical for others. For most users, standard account security settings options are sufficient protection against common threats. But ...

    BBC News

    Syria offensive: US seeks to address Turkey's 'legitimate' security concerns
    BBC News
    The US is willing to work with Turkey to address its "legitimate" security concerns in northern Syria, Secretary of State Rex Tillerson has said. He was speaking after Turkey's military incursion into northern Syria to fight the Kurdish YPG militia at ...
    US Hopes to Work With Turkey on 'Security Zone' in SyriaU.S. News & World Report
    US hopes to work with Turkey to create 'security zone' in Syria: TillersonDaily Sabah
    Turkey has legitimate security concerns: MattisHurriyet Daily News

    all 452 news articles »


    After ignoring for months, Uber fixes two-factor bypass bug after all
    Uber has fixed a security bug that could've allowed an attacker to hack into user accounts by bypassing two-factor authentication, after the ride-sharing company initially said the flaw wasn't a "particularly severe" issue. The company quietly issued a ...


    Uber security flaw compromised two-factor authentication
    Two-factor authentication only works if it's strictly enforced in software, and it sounds like Uber might have fallen short of that goal for a while. In a chat with ZDNet, security researcher Karan Saini has revealed a flaw in Uber's two-factor ...

    and more »

    Report: Afghan security forces committed 75 rights abuses, including child sex assault
    The report from the Special Inspector General for Afghanistan Reconstruction (SIGAR), which was first released to Congress last year but made public Tuesday, says that at least seven of the violations were child sexual assault, but also says "the full ...

    and more »


    Soldiers, snipers and security at Davos: Protecting the world's rich and powerful
    Ensuring the safety of more than 2,500 high-profile political, economic and business guests at an event is never easy; ensuring the safety of more than 70 heads of state and government is a nightmare. The World Economic Forum (WEF) has said security is ...

    and more »

    New York Times

    Prison Guards in France Continue Strike Over Security and Pay
    New York Times
    PARIS — A labor strike by prison guards around France entered its second week on Monday, as the guards vented anger over their pay and dangerous working conditions, an issue that erupted into the open this month after a string of violent assaults by ...

    and more »

    Sun Sentinel

    Security guard shot colleague in Hollywood in fight over gate lock, police say
    Sun Sentinel
    Andres Aviles, 26, drove to Mexico and flew to El Salvador where he was detained while trying to reach Nicaragua, police said. Tonya AlanezContact Reporter · Privacy Policy. The security guard accused of shooting his colleague during a shift change at ...
    Security guard accused of shooting colleague gets caught in El SalvadorWPLG Local 10
    Fugitive security guard fled Florida. His crime caught up with him in El Salvador.Miami Herald

    all 5 news articles »

    Fox News

    US says it wants to help Indonesia provide maritime security
    Fox News
    JAKARTA, Indonesia – U.S. Defense Secretary Jim Mattis says the Trump administration wants to help Indonesia play a central role in maritime security in the Asia-Pacific region. Mattis spoke briefly to reporters Tuesday after meeting with his ...
    US to work with Indonesia on maritime security, counter-terrorismThe Straits Times

    all 168 news articles »
    Google News

  • Arming Yourself Against Spyware

    While clicking from site to site on the internet you... Read More

    Be Aware of Phishing Scams!

    If you use emails actively in your communication, you must... Read More

    Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

    Have you seen the web site, Or have you... Read More

    All About Computer Viruses

    Your computer is as slow as molasses. Your mouse freezes... Read More

    What is Hacking? Are You a Hacker?

    WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

    Top Spyware Removers Considerations

    Only the top spyware removers are successful at detecting and... Read More

    Dont Miss Information Because of Misinformation

    It has been said that with the wealth of information,... Read More

    Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

    The Internet offers a global marketplace for consumers and businesses.... Read More

    5 Simple Steps to Protect your Digital Downloads

    A couple of days ago, I was searching for a... Read More

    Viruses, Trojans, and Spyware - Oh My!

    Have you ever had to call Symantec or McAfee to... Read More

    Online Cell Phone Scams and Spam

    They're out there. Individuals trying to make a quick buck... Read More

    Spyware Protection Software

    Spyware protection software is the easiest way of removing spyware... Read More

    Spyware, This Time Its Personal!

    First the basic definition of Spyware: It is a type... Read More

    Delete Cookies: New-Age Diet or Common Sense Internet Security?

    No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

    Keeping Worms Out of Your Network...

    No auntie Sookie, not earth worms, computer virus worms that... Read More

    I Spy...Something Terribly Wrong (In Your Computer)

    This really chapped my lips...I recently bought a new computer.... Read More

    A Personal Experience with Identity Theft

    Some months ago, before there was much publicity regarding phishing... Read More

    Adware and Spyware: The Problems and Their Solutions

    The Threat10 years ago you could probably have run no... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    Backup and Save your business!

    There you are busily typing away on your PC or... Read More

    Burning Bridges is Bad, But Firewalls are Good

    When you signed up for that ultra-fast DSL or Cable... Read More

    The Bad Guys Are Phishing For Your Personal Information

    Do you know what "phishing" is?No, it doesn't mean you... Read More

    How To Give Away Your Personal Information

    Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

    What Can Be Done About Spyware And Adware

    Having a good Spyware eliminator on your computer is vital... Read More

    Is The Internet Over Regulated

    Today's Internet or World Wide Web is being over regulated.But,... Read More