www.1001TopWords.com |
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is? No, it doesn't mean you grab a pole and head to the late to catchsome phish. The official Webopedia definition of "phishing" is as follows: The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. The e-mail directs the user to visit a Web sitewhere they are asked to update personal information, such aspasswords and credit card, social security, and bank accountnumbers, that the legitimate organization already has. The Website, however, is bogus and set up only to steal the user'sinformation. Phishers prey on ignorance, fear, and emotion. They also play thenumbers game. The more bait they email out, the more phishthey'll catch.. By spamming large groups of people, the "phisher"counts on his email being read and believed by a percentage ofpeople who will volunteer their personal and credit cardinformation. The latest attempt by identity theives to steal the personalinformation of eBay members hit my inbox earlier this week and Ihave to say, this one is pretty convincing. Even this old dog dida double-take before realizing that the identity thieves werephishing for my personal information again. The sender of this email is listed as: eBay Member - rivernickand the email subject line reads: Question from eBay Member. The email begins: "Question from eBay Member -- Respond Now. eBaysent this message on behalf of an eBay member via My Messages.Responses sent using email will not reach the eBay member. Usethe Respond Now button below to respond to this message." Listen to me: DON'T TOUCH THAT BUTTON Of course the email was NOT sent by an eBay member or sent viaeBay's messaging system, as it appears. The email then takes on a threatening tone. It reads: "Question from rivernick: I'm still waiting payment formy item for about 7 days. What happened? Please mail me ASAP or Iwill report you to ebay." The recipient is then prompted to respond to this ratherdisturbing email by clicking a "Respond Now." button. Doing so will take you to a website designed to look like eBaywhere you will be prompted to login using your eBay user name andpassword. Once you pass this point you will be asked to update your accountinformation before proceeding. Unknowing souls will offer notonly their eBay password, but personal and credit cardinformation, as well, without even knowing that they are about tohave their personal information stolen. The one thing that makes this scam so effective is the threat bythe supposed eBay member to "report you to eBay." The email preys on the fear of most eBay members that they are indanger of receiving negative feedback. Many eBayers would ratheryou cut off a pinky than leave them negative feedback. It is thisemotion that the new phishers are hoping to hook. The phisher is betting that most people will either be horrifiedby the threat of being wrongly reported to eBay or they will beticked off that some jerk is threatening them by mistake. Either way the phisher is counting on a percentage of people tohave a knee-jerk reaction and login to the fake eBay website hehas set up clear matters up. I've yet to see what percentage of people who receive thesephishing emails fall for the scam, but if a phisher gets 1% ofrecipients to turn over their personal information, he willprobably consider his phishing expedition a success. I've warned you about these phishing scams before, but let'sreview it one more time. NEVER reply directly to an email that appears to have come fromeBay, Paypal, Amazon, or anyoen else asking you to click a linkin the email to update your account information. If there is anydoubt in your mind whether or not the email is really from eBay,for example, open a browser and type in the URLhttp://www.ebay.com. NEVER click a link within the email torespond. NEVER believe that an email supposedly from another eBay memberis for real. Again, do not click an email link to reply. Open abrowser and go to eBay directly and log in. If the email was froma real member, there will be a record of the inquiry in your MyeBay account. You must be aware that there are bad guys out there who donothing but spend time trying to come up with new and innovativeways to steal your information. Be paranoid. Be aware. But don't be fooled. The phishers will cast their line, but you do not have to takethe bait. Here's to your success, Tim Knox Tim serves as the president and CEO of three successful technology companies and is the founder of DropshipWholesale.net, an online organization dedicated to the success of online and eBay entrepreneurs.http://www.dropshipwholesale.net
|
RELATED ARTICLES
Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'.Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many ways people can get your product for free these days. If we continue doing nothing we will lose even more money this year as potential customers become more and more aware of just how easy it is to obtain digital products without paying for them. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware ? those severely annoying programs that are illegally loaded onto your computer from the internet. Spyware programs can seriously undermine the operating structure of your computer, as well as make you vulnerable to identity theft and other criminal activities. Firewalls, long since a staple in the corporate world for defending large, expensive internal intranets or other networks, has now come into its own as a tool for personal computer owners as well. Your home computer is just as susceptible ? if not more so ? to online attacks, so why should it not be protected? Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. The site will instruct you to enter personal information, such as your account ID, your password, your credit or debit card number and PIN, or your social security number. The criminals are "phishing" for information. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your Data or Hardware. Where as Trojans are used to gain remote access into your system. Always scan any new files you receive as well, even if they are off a friend, you don't know where those files originated from. ALWAYS use a little common sense when on the Internet as well. Don't accept files from an entrusted source. Don't go to web sites you have received spam for, they can be infected with viruses or asking you to download files that are infected. Always go only to official sites (i.e... If you ask for a web address for Norton and someone says ww.nortfix.com, that is obviously not an official site). Keep in mind that an Antivirus will only detect known viruses. It is possible that someone can create a new virus or manipulate an existing Virus or Trojan to the point it will no longer be detected by an Antivirus. As each unknown virus is discovered it is then added into the Antivirus database. Always create rescue disks for your Antivirus program, these will enable you to access your computer through MS-DOS if you are unable to access it through windows. If you do not have an Antivirus program try the HouseCall free online virus scan the link if on the top right side of this page. Also never run 2 different Antivirus . By using two different Antivirus software, sometimes the rule sets can cause conflicts in each other.. or think the other is a virus.. which can also give false positives (meaning it detects a file as a Virus or Trojan, when it isn't one).. or not detect viruses as it should. Always delete files you do not remember downloading. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Companies lost roughly $20 billion to $30 billion in 2002 from the virus attacks, up from about $13 billion in 2001, according to various industry estimates." This was the story across thousands of news agencies desk January 2004. Out of $55 billion, how much did it cost your company? How much did it cost someone you know? The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,... To Work When You Switch Your Pc On ?I Can And I Do It On A Pro-active Basis. Free Ways to Tackle Threats to Your Computer Protect Your PC Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. I knew a Private Investigator who used to break into other firm's voicemail boxes. He was suspected of erasing messages and stealing potential clients. I know you may bethinking that is not right. Maybe so but if a Private Investigator cannot protect him/herself than what use are they to a client. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how? Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop? The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap! Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access. |
© Athifea Distribution LLC - 2013 |