TWEAK ALL CONSULTANTS "Relax,
we'll make it OK!" |
|||||
PHISHING, AS IN ARE YOUR GOING "PHISHING"? OR, HAVE YOU ALREADY BEEN PHISHED?Phishing- The Internet can play a role in identity theft. Today, attention is focused on a relatively new scam called “phishing.” Phishing refers to a practice where someone misrepresents their identity or authority in order to induce another person to provide Personally Identifiable Information (PII) over the Internet. Some common phishing scams involve e-mails that purport to be from a financial institution, credit card company, Internet Service Provider, or other trusted company claiming that a person’s record has been lost. The phishing email directs the person to a website that mimics the legitimate business’ website and asks the person to enter a credit card number and other PII so the record can be restored. In fact, the e-mail or website is controlled by a third party who is attempting to extract information that will be used in identity theft or other crimes. The FTC issued a consumer alert on phishing in 8 June 2004. This third party is sometimes a criminal enterprise that will take your PII and either use it, rent it or sell it. In fact there are rings of web sites all over the world that collaborate in exchanging stolen PII in order to cover the tracks of their confederates and of course to make money. Criminals also specialize. One individual or ring will phish the information and then sell or rent it for a fee to another individual or ring. These acts are not done in some back alley or smoke filled room. These crimes are committed digitally. This means that criminal web sites exchange this information over the Internet either by Email or secure direct uploads and downloads from secret designated web sites. Much of this phishing activity takes place outside the jurisdiction of United States law enforcement in countries of the former Soviet Union, the Middle East, Europe, Asia and Africa. PHISHING EXAMPLES
By the way this misdirection from a real Bank of America website to a fake one is called Pharming. WHAT
CAN I DO ABOUT PHISHING AND HOW CAN
|
Related
Articles:
Spybot%2BSearch
%2Band%2BDestroy|
Spysheriff|Activation Code|Key
Spyware
Detector|Detection|
Detect Spywarer
Spyware Killer|Remover|Killers