Maintain your old Siemens Hipath system

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.

Despite the sad fact that about 5% of phishing attempts are successful for fraudsters, PC users are getting more cautious about bogus e-mails asking for personal and/or financial information.

As public awareness of phishing methods grows, phishers are inventing new tactics in an attempt to delude people.

Yet Another Phishing Scheme: Don't Fax Back, Please

On August 10, 2005 experts from SophosLabs warned us users about a new phishing trick. No bogus websites this time: phishers were trying to make people to send their credit card information? by fax.

The emails claim to be from Paypal, the payment system used by the popular Ebay auction website. They tell a user that a security breach has occurred - someone tried to reset his password. Rather clich├ęd, isn't it? Lots of phishers follow this pattern.

The difference is that no bogus online forms are involved. The email urges the user to download the form (Microsoft Word document), fill it and send by fax.

The online form is hosted on a Polish server. The fields to fill in include: credit card details used in the Paypal account (name on the credit card, its number, type, expiration date), as well as email address on Paypal account with password, post address and phone numbers.

With such a lot of personal identifying information it won't be difficult for a fraudster to pose as this person and commit a bunch of crimes, from cleaning all money from the account to setting deals under the victim's name.

One hasn't to be a genius to guess what people this scam is aimed at. Having heard and read about bogus phishing websites, users are getting suspicious about filling forms online. They might think that faxing personal details is safer -- and make a very costly mistake. Phishers take advantage of our carelessness and credulity.

eBay Scheme - Specially for Kind-Hearted

This scam is even more brazen, because it exploits people's generosity and kindness. Giving a helping hand to an elderly woman ? what can be more natural for any human being?

Emails come ostensibly from Greta, a wheelchair-bound woman of 89. This lady can't find a particular auction, so she "asks you for help".

When some Good Samaritan, willing to assist her, clicks the link in the email, he or she is directed to a bogus eBay site, then, unaware of the deceit, clicks the 'respond now' button and logs on. User names and passwords, obtained this way, most likely will be used to set up deals on eBay under names of other people.

The only way to prevent such scams is stop being credulous and careless. Don't uncritically believe everything you read about -- especially in emails from people you don't know personally.

Don't give out your personal information before verifying where it goes to and whether the claim is genuine.

Whatever the means of providing information -- phone, fax, snail mail or email -- if you hand out certain information, you lose it.

Spam remains one of the favorite tools for identity thieves of all stripes. Never responding, never clicking links within fraudulent spam messages, or, even better, deleting them straight away should become a habit, like washing hands or cleaning teeth.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. Its software effectively prevents keyloggers from stealing information. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

China threatens 'further actions' over US downing of suspected spy balloon
Sun, 05 Feb 2023 07:40:00 +0000
China has threatened "further actions" in response to America's "serious overreaction" in the downing of a suspected spy balloon.

How US shot down China's 'spy balloon' with a single missile - and what was likely on it
Sun, 05 Feb 2023 12:47:00 +0000
A US military operation to shoot down a Chinese "spy balloon" that had been hovering in American airspace came at a tense time for the two superpowers, whose relationship has been on rocky ground for years.

Beyond the 'balloon watch' gimmicks this is an extremely serious moment
Sun, 05 Feb 2023 03:36:00 +0000
For beach-walking South Carolinians, it would have been quite the Saturday afternoon spectacle. 

Ukraine expecting major Russian offensive around invasion anniversary
Sun, 05 Feb 2023 15:04:00 +0000
Ukraine is expecting a possible major Russian offensive launched for "symbolic" reasons around the anniversary of its invasion later this month, the country's defence minister has said.

Protests in Iraq after YouTube star allegedly strangled in 'honour killing'
Sun, 05 Feb 2023 15:04:00 +0000
Dozens of Iraqi protesters gathered on Sunday to stand against the "honour killing" of a 22-year-old YouTube star - who was allegedly strangled by her father.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More