What is Phishing - How Scammer Uses Phishing Techniques

What is Phishing - How Scammer Uses Phishing Techniques
What is Phishing - How Scammer Uses Phishing Techniques

Phishing techniques trick Internet users into giving personal information like credit card information, social security numbers, passwords, account numbers and other personal details to a scammer. The scammer then uses personal information for illegal purposes such as identity theft or fraud.
Phishing scams are disguised as legitimate emails that call for urgent action on the user's behalf. Scams contain links that appear real and link to a false website. The emails are usually in Hypertext Markup Language (HTML) and include logos, contact names, colors, fonts, and information that are virtually similar to an actual website. The hyperlinks lead you to fraudulent sites that ask you to provide certain personal information. A tactic often used by scammers is to include an actual link in the email just in case you decide to contact the real company.

The scammer conveys a sense of urgency for action on your behalf. The most common reasons for asking information are server updates, security updates, confirmation on a recent order, threat of account being terminated, implication of a security breach, verification of account, or a routine checkup.
A legitimate organization will never ask you for personal information over email. If you suspect that you have received a phishing email, contact the legitimate organization by phone or in person.

Benefits
There are no benefits of phishing, and you will end up as a victim of fraud and identity theft. The only advantage is to the scammer, which is usually a monetary advantage.

How It Works
A phishing scam involves an unsolicited email that asks for personal information. The email appears to be from a legitimate company like a bank or employer. Everything will seem real, including the scammer's website and email address. The scammer collects, uses, and sells your information for illegal purposes. Oftentimes, you won't realize that you're a victim until you start receiving bills for questionable transactions. Someone might even access your credit to apply for a loan.

Scammers usually pose as established customer based companies like America Online (AOL), PayPal, and Bank of America. They claim to be representing a company and will ask for details including your address, phone, social security number and reference contacts.

The best way to protect yourself from phishing scams is to know and learn what to look for. Unsolicited emails taking you to company websites should be viewed critically, especially when emails request personal information. A way to recognize a phishing email is to rest your mouse over the hyperlink. If you see a string of numbers instead of an actual web address, you'll know that the hyperlink is fake. You should also look at the actual spelling of the original website as there maybe typo errors. For example the eBay scam came from ebaycom.com instead of ebay.com. 

Check out for formatting errors like a missing blank or too many blank spaces. Be detail oriented, and know that a legitimate company will never ask you for personal information over email.

Companies/Brands

Norton, BrandProtect, MarkMonitor, Internet Identity, Netcraft, and Digital Resolve provide services that can help protect you from phishing scams.
What is Phishing - How Scammer Uses Phishing Techniques What is Phishing - How Scammer Uses Phishing Techniques Reviewed by RD Singh on 08:48 Rating: 5
Powered by Blogger.