Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)

This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing", the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

It's an online form of Identity Theft. The email then directs you to visit a fraudulent website where you are asked to provide maintenance or update your personal information, such as:

  • Social Security Number

  • Passwords or PIN numbers

  • Bank Account Numbers

  • ATM,Debit, or Credit Card Numbers

  • Credit Card Validation Codes

  • Your Phone Number and Address
Learn How To Identify It

Phishing is so dangerous because the average email user does not know how to identify a fraudulent email.

Here are some things to keep in mind:

  • Legitimate businesses do not ask you for your personal information by email.

    Sometimes it may be necessary to update your information, but most businesses will alert you to this when you sign in to your account through the business's website. So - just as you wouldn't provide personal information to telemarketers and people you don't know - you shouldn't provide it to anyone asking you for that in any email.

  • Fake email messages are often not personalized.

    When your bank, credit card company, loan company, etc. sends you an email it is usually personalized. It's only common courtesy to use your name. So this would also be an indication that the email is a spoof.

  • A link in the email is masked.

    This is the part that confuses most people. "Masking" a link is simply asking you to click on a link that directs you somewhere else than what you thought you were clicking on.

    A simple way you can catch this is by moving your cursor over the link and looking at the bottom of your browser on the status bar. This will show you the actual website the link is going to take you to.

  • The "lock" in the status bar is not engaged.

    You need to make sure that the lock in the status bar is locked. This ensures you that the page you are on is secure. If it doesn't have the lock, then any personal information that you put on there could be compromised.

  • Here Are Three Things To Keep In Mind

  • Never reply to email messages that request your personal info.
  • Never click on suspicious links. Move your cursor over the link to see where it is directing you.
  • Make sure the site is secure. Check the lock on the status bar.

    Article taken from

    Article Provided By: Identity Theft Prevention Guide
    10 Million Victims in the last 5 years. Don't Be The Next ONE.
    Minimize Your Exposure...Learn How.

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at


    Amazon is now selling home security services, including installations and no monthly fees
    Amazon's made a slew of acquisitions in the area of smart home services, and now it's offering a product that brings them together under one roof — your roof. Amazon has quietly launched a portal offering home security services — which include all ...
    Security Researchers Created a 'Skill' that Allows Alexa to Spy on YouGizmodo
    Amazon launches home security services; Alexa gains memory, more conversationsSeeking Alpha
    Is Alexa spying on YOU? Security researchers reveal how the assistant's code could be tweaked to create new 'skill ...Daily Mail
    Boing Boing -Investor Relations Solutions -Tech Times -Checkmarx
    all 190 news articles »

    Washington Post

    Top Homeland Security officials urge criminal prosecution of parents crossing border with children
    Washington Post
    The nation's top immigration and border officials are urging Homeland Security Secretary Kirstjen Nielsen to detain and prosecute all parents caught crossing the Mexican border illegally with their children, a stark change in policy that would result ...
    Homeland Security officials want to prosecute all parents who cross border with kids: reportThe Hill
    Lawmakers slam Trump's Homeland Security chief over focus on immigrant caravan, border wallCNN

    all 26 news articles »

    Digital Trends

    Reolink's latest breakthrough pulls the plugs on smart security cameras
    Digital Trends
    After a string of successes, Hong Kong-based security camera manufacturer Reolink is getting good at crowdfunding campaigns. Its latest project to land with a smash on Indiegogo is the Reolink Go, a powerful 4G-enabled, solar-powered security monitor ...

    and more »

    Washington Post

    Mattis: US would regret delegating security in Syria to a force with no American involvement
    Washington Post
    Defense Secretary Jim Mattis said Thursday that the United States would regret installing a holding force in Syria without American involvement, indicating military leaders harbor reservations about a White House effort to task Arab militaries with ...

    and more »

    Herald-Mail Media

    WCPS superintendent talks safety, security at listening session
    Herald-Mail Media
    Safety and security remain on the minds of Washington County Public Schools students and parents as the district works to identify potential improvements. WCPS Superintendent Boyd Michael again fielded questions on the topic during a listening session ...


    Deputy US marshals on Rosenstein security team save woman after fentanyl overdose
    (CNN) Last year, Deputy Attorney General Rod Rosenstein traveled to China to press leaders on the country's export of the lethal synthetic opioid fentanyl to the United States. Days ago, two members of his security detail were confronted with the ...

    and more »


    How Short Sellers Built a Business on Security Bugs
    In an email sent to the general security inbox maintained by the Santa Clara, Calif., chipmaker, an executive of a security company located on the other side of the world claimed to have discovered 13 critical vulnerabilities in AMD's line of chips ...

    CBS News

    National security experts on challenges of the American presidency
    CBS News
    According to Stephen Hadley, who was national security adviser to George W. Bush for close to a decade, President Trump faces "the most challenging situation we've faced as a country internationally since the end of the Cold War." Hadley also worked in ...

    and more »

    The Japan Times

    Tight security surrounds Kim Jong Un, even more so than previous North Korean leaders
    The Japan Times
    Ri Yong Guk, a defector from the North who served on a security detail for Kim Jong Il, wrote in a 2013 memoir that as many as six different layers of security guards protected the leader on trips to the countryside to inspect military units, plants or ...
    Kim's Jong Un's Security: "Not Even An Ant Can Pass Through"NDTV

    all 3 news articles »

    Brookings Institution

    Redefining national security: Why and how
    Brookings Institution
    From climate change to public health to migration, global trends formerly considered separate from national security are increasingly understood to shape American security interests at home and abroad. Drawing connections to U.S. national security has ...

    Google News

  • Reporting Internet Scams

    When it comes to reporting Internet scams most of us... Read More

    The Top Twelve Threats No Computer User Should Ignore

    The internet is undoubtedly a fantastic resource for families and... Read More

    The Risk Of Electronic Fraud & Identity Theft

    Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

    Identity Theft Offline -- So Many Possibilities

    Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

    Pharming - Another New Scam

    Pharming is one of the latest online scams and rapidly... Read More

    Dialing Up a Scam: Avoiding the Auto-Dialer Virus

    For many, the daily walk to the mailbox evokes mixed... Read More

    Is My PC Vulnerable on the Internet?

    No longer are viruses the only threat on the internet.... Read More

    Make Money Online - Defend Against The Latest Scam

    First, let's do a little recap'. As I stated in... Read More

    Viruses, Trojans, and Spyware - Oh My!

    Have you ever had to call Symantec or McAfee to... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    Desktop Security Software Risks - Part 1

    This is the second in a series of articles highlighting... Read More

    Why you Must Secure your Digital Product and Thank You Web Page

    A couple of years back, I paid my dues the... Read More

    Virus Prevention 101

    Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

    How to Thwart the Barbarian Spyware!

    Today,on most internet user's computers, we have the ability to... Read More

    Password Security and Safety

    There is nothing more important that password security in world... Read More

    Cybercriminals Trick: Targeted Trojan-Containing Emails

    Threats we ordinary Web users face online leave us no... Read More

    Internet Scams: Dont be a Victim

    As the number of people using the Internet as an... Read More

    Everything You Need To Know About Spyware and Malware

    You are at your computer, checking out software on EBay.... Read More

    IPv6 - Next Step In IP Security

    IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

    Secure Your PC From Hackers, Viruses, and Trojans

    Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

    Top Ten Spyware and Adware Threats Identified

    On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

    Hacking the Body Via PDA Wireless Device

    First I would like to stress I am condoning the... Read More

    3 Pervasive Phishing Scams

    Scams involving email continue to plague consumers across America, indeed... Read More

    Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

    The Internet offers a global marketplace for consumers and businesses.... Read More

    What to Look for before You Purchase Spyware Software

    Huge number of spyware software applications are available in the... Read More