Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing - Learn To Identify It > NetSparsh - Viral Content you Love & Share

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

    Department of Defense

    Mattis Commends Norway's Commitment to Global Peace, Security
    Department of Defense
    Defense Secretary James N. Mattis hailed the strong bond between the United States and Norway and commended the Nordic nation for its commitment to global peace and security in Oslo, Norway, yesterday. Defense Secretary James N. Mattis shakes ...

    and more »


    Google Roundup: Eight New Features Plus A Major Security Upgrade For Chrome
    Google was busy this week with upgrades and new features for its apps and devices, and a major security update for the Chrome browser. Here are some of the changes Google rolled out recently. Google Home supports URL and iCal calendars.

    and more »

    Chicago Tribune

    Pakistanis urge military to boost security after hundreds die in attacks before election
    Chicago Tribune
    A string of violent attacks at political rallies, killing nearly 160 people this week, has the nation on edge about security for the upcoming national elections, with some political leaders blaming the Pakistani government for not doing enough to ...
    Pakistanis urge the military to boost security as attacks mount before electionWashington Post

    all 747 news articles »

    Bulletin of the Atomic Scientists

    Approving the climate security agenda
    Bulletin of the Atomic Scientists
    The UN Security Council held a meeting this week under the heading, “Understanding and Addressing Climate‑related Security Risks.” It was just the third time the body has officially debated climate change as a security concern, but with Trump making ...

    and more »

    Online security: 10 tips for better password protection
    We are in the technology age -- nearly everything is done, and stored, online. You can check your bank account information, pay bills, and order just about anything. Your email and social media accounts contain droves of personal information ...


    People are getting fed up with passwords and security questions
    Pretty much anything we do online now requires some sort of password, and as part of setting up those passwords we need to provide some security questions (and answers). It's a part of life, really. All of it is meant to protect us, ensuring we are the ...

    The Jerusalem Post

    Security cabinet decides IDF will respond to all kites and balloons
    The Jerusalem Post
    Israel will extract a price from Hamas for sending flammable balloons and kites to Israel, just as it extracts a price when they send missiles, Transportation Minister Yisrael Katz, who is a member of the security cabinet, said immediately following a ...
    Security Cabinet to convene for emergency meeting as Gaza violence intensifiesThe Times of Israel

    all 891 news articles »

    Two protesters killed in clashes with Iraqi security forces - police official
    BAGHDAD (Reuters) - Two protesters were killed in clashes with Iraqi security forces in the town of Samawa on Sunday, a police official said, amid growing unrest in southern cities over poor public services and widespread corruption. “Hundreds of ...
    Security forces deploy in Iraq's Najaf after day of

    all 223 news articles »

    Dallas News

    Armed man shot by security guard at Fort Worth strip club, police say
    Dallas News
    A man is in critical condition after a strip club's security guard shot him multiple times early Sunday in Fort Worth, police say. Officers were called to the Roxy Showgirls club at 1300 Northeast Loop 820 about 2:45 a.m., police said. The wounded man ...
    Security Guard Shoots Man Who Pulled A Gun: Fort Worth PoliceNBC 5 Dallas-Fort Worth
    PD: Man shot by Fort Worth club's security guardFOX 4 News

    all 5 news articles »

    Chicago Tribune

    Paraglider charged for breaching no-fly security zone with anti-Trump banner in Scotland
    Chicago Tribune
    A man has been charged in connection with a Greenpeace protest that breached a no-fly security zone and flew a banner close to the golf resort where President Donald Trump was staying, Scottish police said Sunday. The paraglider carried a banner ...
    Trump Fuels Anxiety in Europe Over SecurityWall Street Journal
    Trump Jeopardizes NATO Countries' Security - German Foreign MinisterSputnik International

    all 4,761 news articles »
    Google News

  • Phishing - Identity Theft & Credit Card Fraud

    What is Phishing? Phishing is a relatively newly coined term... Read More

    Spyware, What It Is, What It Does, And How To Stop It

    Spyware is software that runs on a personal computer without... Read More

    An Open Letter From a So-called Stupid

    Someone recently told me, "You would have to be a... Read More

    Computer Viruses - How to Remove a Computer Virus from Your Computer

    Computer viruses infect millions of computers every day. Viruses can... Read More

    Backup and Save your business!

    There you are busily typing away on your PC or... Read More

    Watch Out For That Scam

    The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

    Personal Firewalls for Home Users

    What is a Firewall?The term "firewall" illustrates a system that... Read More

    Identity Theft - Dont Blame The Internet

    Identity theft ? also known as ID theft, identity fraud... Read More

    Internet Shopping - How Safe Is It?

    Millions of people make purchases online, but many people are... Read More

    Top Spyware Removers Considerations

    Only the top spyware removers are successful at detecting and... Read More

    Detect Spyware Online

    You can detect spyware online using free spyware cleaners and... Read More

    How To Be Your Own Secret Service Agency

    So you want to know who your kids are chatting... Read More

    Reclaim Your PC from the Internet Spies

    Viruses are, however, not the only malicious software programs out... Read More

    Viruses and Worms: The Problems and Their Solutions

    History and BackgroundThe virus was one of the first ever... Read More

    Avoid Internet Theft, Fraud and Phishing

    Since its birth, the Internet has grown and expanded to... Read More

    Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

    Can you protect your computer from all possible viruses and... Read More

    Virus and Adware - Fix them Both!

    We all get the odd virus now and then, but... Read More

    Secrets On Security: A Gentle Introduction To Cryptography

    Let us take the example of scrambling an egg. First,... Read More

    Why you Must Secure your Digital Product and Thank You Web Page

    A couple of years back, I paid my dues the... Read More

    Top Five Online Scams

    The top five online scams on the Internet hit nearly... Read More

    Firewall Protection - Does Your Firewall Do This?

    The first thing people think about when defending their computers... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    What Every Internet Marketer Should Know About Spyware

    If you run any type of Internet business, Adware and... Read More

    Preventing Online Identity Theft

    Identity theft is one of the most common criminal acts... Read More

    Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

    Have you seen the web site, Or have you... Read More