What is Phishing - How Scammer Uses Phishing Techniques
Phishing techniques trick
Internet users into giving personal information like credit card information,
social security numbers, passwords, account numbers and other personal details
to a scammer. The scammer then uses personal information for illegal purposes
such as identity theft or fraud.
Phishing scams are disguised
as legitimate emails that call for urgent action on the user's behalf. Scams
contain links that appear real and link to a false website. The emails are
usually in Hypertext Markup Language (HTML) and include logos, contact names,
colors, fonts, and information that are virtually similar to an actual website.
The hyperlinks lead you to fraudulent sites that ask you to provide certain
personal information. A tactic often used by scammers is to include an actual
link in the email just in case you decide to contact the real company.
The scammer conveys a sense
of urgency for action on your behalf. The most common reasons for asking
information are server updates, security updates, confirmation on a recent
order, threat of account being terminated, implication of a security breach,
verification of account, or a routine checkup.
A legitimate organization
will never ask you for personal information over email. If you suspect that you
have received a phishing email, contact the legitimate organization by phone or
in person.
Benefits
There are no benefits of
phishing, and you will end up as a victim of fraud and identity theft. The only
advantage is to the scammer, which is usually a monetary advantage.
How It Works
A phishing scam involves an
unsolicited email that asks for personal information. The email appears to be
from a legitimate company like a bank or employer. Everything will seem real,
including the scammer's website and email address. The scammer collects, uses,
and sells your information for illegal purposes. Oftentimes, you won't realize
that you're a victim until you start receiving bills for questionable
transactions. Someone might even access your credit to apply for a loan.
Scammers usually pose as
established customer based companies like America Online (AOL), PayPal, and
Bank of America. They claim to be representing a company and will ask for
details including your address, phone, social security number and reference
contacts.
The best way to protect
yourself from phishing scams is to know and learn what to look for. Unsolicited
emails taking you to company websites should be viewed critically, especially
when emails request personal information. A way to recognize a phishing email
is to rest your mouse over the hyperlink. If you see a string of numbers
instead of an actual web address, you'll know that the hyperlink is fake. You
should also look at the actual spelling of the original website as there maybe
typo errors. For example the eBay scam came from ebaycom.com instead of
ebay.com.
Check out for formatting errors like a missing blank or too many
blank spaces. Be detail oriented, and know that a legitimate company will never
ask you for personal information over email.
Companies/Brands
Norton, BrandProtect,
MarkMonitor, Internet Identity, Netcraft, and Digital Resolve provide services
that can help protect you from phishing scams.
What is Phishing - How Scammer Uses Phishing Techniques
Reviewed by RD Singh
on
08:48
Rating: