Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Email Scams ? Ten Simple Steps To Avoiding Them > NetSparsh - Viral Content you Love & Share

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims.

Phishing (pronounced fishing), is online identity theft that uses spoof emails, fraudulent websites and crimeware to trick unsuspecting internet users into providing financial data, credit card numbers, social security numbers, account logins and passwords, etc.

These email scams (spoof email) mimic legitimate companies such as banks, credit card companies, investing companies, paypal, ebay, etc. These fraudulent emails look like they are from the "real" company; many even include the real company's logo. Generally these emails try to convey a sense of urgency; if you don't correct this problem your account will be suspended.

The spoof email may state that there is a problem with your account and if you do not log in and update your information your account may be suspended, restricted, terminated, or something similar. They may also request user name, passwords, credit card numbers, social security numbers, etc.

Protecting yourself against phishing and email scams.

    1. Do not give out personal or financial information through an email request.
    2. Always log on to your sensitive accounts by opening a new browser and typing the actual URL directly into the address bar. For example, if you receive a suspected phishing email from ebay, open a new browser and type "" in the browser bar.
    3. Do not click on any link in a suspected phishing email.
    4. Do not open any attachments in a suspected email scam.
    5. Only use a secure website to submit sensitive data. A secure sites' address will begin with https:// instead of http://
    6. Check the activity of your online accounts regularly and check for fraudulent activity.
    7. Make sure your browser is up to date and all security patches are installed.
    8. Report phishing and spoof email to: ,, and forward the email to the company that is being spoofed.
    9. Keep your PC protected with updated anti-virus software, anti-spyware software, and a firewall.
    10. You may want to install an anti-phishing toolbar such as Earthlink ScamBlocker which alerts you before you visit a known fraudulent website. It's free and can be downloaded at

As email scams are on the rise and with the consequences being identity theft, it is important that you increase your awareness and learn to protect yourself from these fraudulent attacks. With more than 75 million phishing emails being sent every day it's only a matter of time before you receive one. By following the above tips you will protect yourself from many email scams and the possible financial consequences.

Lisa Smith makes it easy to increase your online privacy in her newest book, "Internet Safety Tips & Resource Guide. How To Increase Your Online Privacy and Security." To download a free copy and have free internet safety & security articles e-mailed to you every month visit: Email Scams and Phishing

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

The Hill

Russian Defense Ministry says it's ready to boost security cooperation with US
The Hill
"The Russian Defense Ministry is ready for practical implementation of the agreements in the sphere of international security reached by Russian and U.S. Presidents, Vladimir Putin and Donald Trump, at their Monday's summit in Helsinki," Igor ...
Russian Defense Ministry 'Ready' to Implement Putin-Trump Security AgreementsNewsweek
Rubio, Warner Stress Election Security After Trump-Putin SummitWIRED
What Do You Do Now, US National Security Leaders?Defense One
Reuters -The Register -Just Security
all 3,835 news articles »

Petoskey News-Review

New security measures begin next week at Emmet county building
Petoskey News-Review
... of acts of violence resulting in deaths and personal injuries,” in public buildings throughout the United States and sought to “provide an enhanced level of safety and security in the Emmet County Building by restricting the entry of weapons into ...

Washington Post

'Morally repugnant': Homeland Security advisory council members resign over immigration policies
Washington Post
Four members of a Homeland Security advisory council have resigned in protest over the Trump administration's immigration policies, citing the “morally repugnant” practice of separating immigrant families at the border. Richard Danzig, former secretary ...
Homeland Security advisory council members resign over family separations: reportThe Hill

all 4 news articles »

Unprecedented security at Kashmir's annual Hindu pilgrimage | Asia ...
Last year, fighters targeted a tourist bus, killing eight people who were performing the gruelling Amaranth Yatra.

and more »


Denver airport's massive transformation: new gates, smoother security
Hundreds of flyers wait in TSA security lines in Denver International Airport's Great Hall. Airport managers have launched a major renovation of the hall, hoping to speed up security screenings and improve the passenger experience. (Photo: Trevor ...

and more »

Military Times

MAVNI troops falsified records, were security risk, DoD says
Military Times
Mattis, “provide context for you regarding the true national security issues at stake,” said Pentagon spokeswoman Air Force Maj. Carla Gleason. The U.S. District Court Western District of Washington is considering the lawsuit, which was filed on behalf ...


Coinbase Wins Nod on Deals as It Seeks to Add Security Coins
Coinbase Inc., one of the most popular cryptocurrency platforms, said it got the green light from U.S. watchdogs to move forward with a trio of acquisitions that will allow it to become one of the first federally regulated venues for trading digital ...
Coinbase Says It Now Has Regulatory Approval to List Security TokensCoinDesk
Coinbase Gains SEC Approval to List Security TokensBitcoinist
Coinbase Gains Approval to List Security TokensCryptoSlate
CCN -Bloomberg -The Coinbase Blog
all 41 news articles »

The Conversation US

Microprocessor designers realize security must be a primary concern
The Conversation US
Recently, security researchers have found that some innovations have let secrets flow freely out of computer hardware the same way software vulnerabilities have led to cyberattacks and data breaches. The best known recent examples were the chip flaws ...

Security measures at our paper may seem extraordinary. They shouldn't.
Columbia Journalism Review
Now, easy access to the Monterey County Weekly lobby—via an open front door, a laissez-faire approach to security that allowed anyone, appointment or no, to walk directly into the newsroom via a frequently unlocked side gate—is all in the past. I ...


Security Firm ObserveIT Grabs $33M to Get Ahead of Insider Threats
Cyber breaches caused by people within businesses and organizations, both accidental and malicious leaks, continue to multiply. Now, a Boston security startup is arming itself with more cash and enhanced technology to try and stop these insider threats.

and more »
Google News

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More


P C. owners are constantly at risk from attacks by... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More