Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.
Despite the sad fact that about 5% of phishing attempts are successful for fraudsters, PC users are getting more cautious about bogus e-mails asking for personal and/or financial information.
As public awareness of phishing methods grows, phishers are inventing new tactics in an attempt to delude people.
Yet Another Phishing Scheme: Don't Fax Back, Please
On August 10, 2005 experts from SophosLabs warned us users about a new phishing trick. No bogus websites this time: phishers were trying to make people to send their credit card information? by fax.
The emails claim to be from Paypal, the payment system used by the popular Ebay auction website. They tell a user that a security breach has occurred - someone tried to reset his password. Rather clichéd, isn't it? Lots of phishers follow this pattern.
The difference is that no bogus online forms are involved. The email urges the user to download the form (Microsoft Word document), fill it and send by fax.
The online form is hosted on a Polish server. The fields to fill in include: credit card details used in the Paypal account (name on the credit card, its number, type, expiration date), as well as email address on Paypal account with password, post address and phone numbers.
With such a lot of personal identifying information it won't be difficult for a fraudster to pose as this person and commit a bunch of crimes, from cleaning all money from the account to setting deals under the victim's name.
One hasn't to be a genius to guess what people this scam is aimed at. Having heard and read about bogus phishing websites, users are getting suspicious about filling forms online. They might think that faxing personal details is safer -- and make a very costly mistake. Phishers take advantage of our carelessness and credulity.
eBay Scheme - Specially for Kind-Hearted
This scam is even more brazen, because it exploits people's generosity and kindness. Giving a helping hand to an elderly woman ? what can be more natural for any human being?
Emails come ostensibly from Greta, a wheelchair-bound woman of 89. This lady can't find a particular auction, so she "asks you for help".
When some Good Samaritan, willing to assist her, clicks the link in the email, he or she is directed to a bogus eBay site, then, unaware of the deceit, clicks the 'respond now' button and logs on. User names and passwords, obtained this way, most likely will be used to set up deals on eBay under names of other people.
The only way to prevent such scams is stop being credulous and careless. Don't uncritically believe everything you read about -- especially in emails from people you don't know personally.
Don't give out your personal information before verifying where it goes to and whether the claim is genuine.
Whatever the means of providing information -- phone, fax, snail mail or email -- if you hand out certain information, you lose it.
Spam remains one of the favorite tools for identity thieves of all stripes. Never responding, never clicking links within fraudulent spam messages, or, even better, deleting them straight away should become a habit, like washing hands or cleaning teeth.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. Its software effectively prevents keyloggers from stealing information. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc
Learn more -- visit the company's website http://www.anti-keyloggers.com
There is no doubt that "how-to articles" have become a... Read More
There is nothing more important that password security in world... Read More
If you are wondering how to fight spyware for safe... Read More
You and I are a lot alike. We are both... Read More
The Internet is a vast International Network of people and... Read More
You are at your computer, checking out software on EBay.... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Spyware is software or hardware installed on a computer without... Read More
As soon as almost all computer users already got used... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Despite the current wave of identity theft and corporate security... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Identity Theft is one of the most serious problems facing... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Since its birth, the Internet has grown and expanded to... Read More
At this point, if you've got the whole "turning the... Read More
The most frustrating part of having Spyware on your computer... Read More
When surfing the Internet you probably take your anonymity for... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
You've seen it in the news - 40 million credit... Read More
Computer security for most can be described in 2 words,... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
In the past I've never really paid much attention to... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
You may not realize it, but as you are surfing... Read More
If you use the internet, you have probably been infected... Read More
You've seen it in the news - 40 million credit... Read More
During the release of a new software product specialized to... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
A couple of years back, I paid my dues the... Read More
If you run any type of Internet business, Adware and... Read More
When it comes to reporting Internet scams most of us... Read More
Spyware is the most troublesome software to appear on the... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Much has been said on the theory of password protection... Read More
Do you really have to know how feeds work? Not... Read More
Whether we like it or not, we are all living... Read More
Before we start, I want to make it clear that... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
I got a virus the other day, Thursday I believe... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
A few nights ago I received an email from "2CO"... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
|