Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.

But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse.

"Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more.

Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet.

Here's the basic pattern for a "phishing" scam...

You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity.

In the email it tells you that something bad is about to happen unless you act quickly.

Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name.

In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up.

Once you give up your information... it's all over but the crying!

After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse.

An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers.

In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal.

They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it.

Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account.

This new "phishing" style scam works extremely well for 2 basic reasons.

First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking.

Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional frenzy.

The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense.

Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox.

If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think!

Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling.

Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it.

Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com).

Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate.

Above all remember this:

Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information.

They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details.

About The Author

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Need MORE TRAFFIC to your website or affiliate links? "Turn Words Into Traffic" reveals the secrets for driving Thousands of NEW visitors to your website or affiliate links... without spending a dime on advertising! Click Here> http://www.TurnWordsIntoTraffic.com

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D., and you're part of a... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or scam would make one think... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a real tool to be used... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that can get to you computer... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the market, some being offered as... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable connection there was probably one... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for granted, most of us do.Tapping... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck at your expense. You labour... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from a friend who told me... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection.... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure and know for certain that... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type of software which is installed... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many to buy and sell new... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A lot of them use it... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes, immediately notifying you when a... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously.... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed feelings: The glee that your... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity of scam emails with various... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing the web all sorts of... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many to send and receive money.... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I would stop by to look... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You surf your favorite sites, Sports,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant pins". These companies usually have... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers called CardSystems Solutions, Inc., a... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that protects a network and the... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the Internet in recent times. When... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal will send you an email... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit cards exposed!With all the news... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a more flexible work schedule and... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network Security becomes a larger issue.... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This week, my email box was... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet security can go a long... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from a man in Indonesia about... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike any other corporate asset, and... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without the knowledge or consent of... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly ten million people last year... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer. Mine was getting old, had... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a keylogger to record every single... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First, crack the shell, pour the... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is an effort to batter your... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole new breed of criminals have... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the computer on" thing down; you... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you grab a pole and head... Read More