Internet Security Information |
|
Dont Allow Hackers to Take Out Money from Your Bank Account
If you know what is the 'Fishing' then it's very easy to understand the definition of 'Phishing'. Just replace letter 'F' from the word Fishing with 'Ph'. Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers. Phishing & Spoof Web sites The role of hacker is to lure the innocent Netizens by sending an e-mail from spoof sites, pseudo claiming to be an legitimate enterprise in an attempt to force the user into surrendering private information such as password, credit card number, and social security number etc; which will be used for identity theft. The hyperlink in the e-mail directs the innocent user to a spoof Web site where they are asked to enter personal information like passwords, social security, and bank account numbers. Basically hackers create Spoof Web sites to steal the user's personal information. The Idea Behind Spoof Sites I can give you the well-known example in which users received Spam e-mails from hackers misleading innocent users. As if these mails came from eBay, claiming that the user's account was about to be suspended unless he clicked on the hyperlink in the e-mail and update the credit card information hold by the genuine eBay web site. The idea behind this scam is very simple as it is relatively simple to make a Web site look like a legitimate site. That is why the Phishing is also called brand spoofing. Tips To Stop Phishing & Report Phishing * If you smell anything fishy (phishy) or if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Simply delete such e-mail and make it thumb rule... never click that hyperlink in the e-mail. * Contact your bank or financial institution on phone and confirm whether it has sent you such type of e-mail. * Report Phishing to Federal Trade Commission (FTC). * Send Internet Phishing scam reports to local authorities like police and crime bureau. * Send details of a Phishing scam to the Anti-Phishing Working Group (APWG) to help them to build database of Phishing scams, and to alert the Netizens. * Last but not the least if you can't afford to neglect or you are tempted to think that the hyperlink in the received e-mail is worth to click... take a deep breath, think twice before clicking that suspicious hyperlink and copy and paste the URL (hyperlink) into the web browser's address field and log on. This will help you to land on legitimate Web site instead of spoof Web site. Popular Targets Of Phishers 1) Banks & Financial Institutions. 2) Credit card companies. 3) Auction portals. 4) Online stores. 5) Online stock trading companies. How To Smell Phishing? It is very difficult for e-mail recipients to guess what they have in their mailbox. They can't guess Whether it is legitimate e-mail from an organization With whom they do transactions. Although the "From" Field of the e-mail may have the web site address of That organization, and the hyperlink may also appear, If the sender insists on clicking that hyperlink and Unfortunately you click that hyperlink you will land To a spoof Web site. To avoid this situation you must Have that sense to smell something fishy (phi shy) Because any legitimate web site never ask you to Update your personal information simply by sending a Hyperlink through the e-mail, use your commonsense and Ask yourself a simple question, why the legitimate web Site would ask you to update your personal information through a hyperlink via e-mail, since that organization has its own legitimate web site? I hope you have got the answer. Krishna Pai is a webmaster and a writer. Get Internet Security tips, Computer Tutorials, reviews, Hardware & Software Tips, How to guides at http://www.cheapest-computer-hardware-software.com/ For more Computer tips join his "Build Computer ezine" at http://www.cheapest-computer-hardware-software.com/build_computer_ezine.html
|
RELATED ARTICLES
Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Is Spyware Watching You? Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a decision to purchase any such software we should check the reliability and should consider various attributes possessed by them and then select the best and the most appropriate one. The various attributes that one should consider to be the most important when purchasing spyware detection and removal software are - Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how? How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. You can read about it here! And there are many other scams like Lottery, Letter of Credit, money transfer, black money conversion, real estate, fraudulent order and the list goes on and on. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware ? those severely annoying programs that are illegally loaded onto your computer from the internet. Spyware programs can seriously undermine the operating structure of your computer, as well as make you vulnerable to identity theft and other criminal activities. Firewalls, long since a staple in the corporate world for defending large, expensive internal intranets or other networks, has now come into its own as a tool for personal computer owners as well. Your home computer is just as susceptible ? if not more so ? to online attacks, so why should it not be protected? Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff.com? Or have you been turned on to www.freeipods.com? Or maybe some friend sent you an email suggesting you log on to one of these sites and take advantage of one of its numerous "free offers." Computer Security What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. There are so many malicious programs floating around out there that one or two have bound to have gotten past all of your security settings. McAfee and Norton Anti Virus are both excellent programs, but even they can be beaten by the determined spyware makers and distributors. One recent computer repair man said, close to 80% of the machines that he services have spyware on them. I believe it. Spyware can be sneaky and it can install quietly without your knowledge. Your system probably has spyware on it; make sure it doesn't corrupt your data files or worse. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet." Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore it? If she gave it back, we wouldn't have a movie, now would we? Stacy then proceeds to identify his ex-girlfriends and contact them. Let the games begin. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms... oh my! Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. The personal information collected is usually the name of the user; the users email address, Websites visited, online shopping habits, as well as various other information about the user. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internet is quick, convenient and is probably safer than you think. However, you still need to be aware that it is essential to vigorously protect your privacy and financial information when making purchases online. With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. With law enforcement agencies overwhelmed and under trained to address these issues, victims have often been left to deal with them on their own. Detect Spyware Online You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free programs will remove any spyware programs currently running on your computer. Spyware Removal Spyware Solution |
home | site map |
© 2005 |