Identity Theft: How to Combat Phishing

Identity Theft How to Combat Phishing

Along with the advance of technology and a more sophisticated internet also comes new and creative ways for internet fraudsters to refine their methods of "phishing" for personal information.

What is Phishing?

"Phishing" refers to methods used by scam artists to acquire sensitive information like social security numbers, credit card information, personal banking information, usernames, and passwords.

First coined in 1996, the word "phishing" is a variant of "fishing" and refers to the act of baiting unknowing consumers into giving up their personal information.

How It Is Done

One of the most common ways that crafty con artists bait internet users is with a phony e-mail. They send out a message mimicking a bank or credit card company that contains a request to verify a password, account number or other financial information, along with a bogus link. As the e-mail recipient responds by following the link provided, their personal information ends up in the hands of a scammer who then uses it for illegal purposes. This can result in a full-blown case of identity theft.

What You Can Do to Prevent "Phishing"

Fortunately, there are many ways to avoid this type of situation.

Never open a link from an e-mail. Legitimate companies do not ask for sensitive personal information by e-mail. If you suspect that there might really be a problem with your account, contact the company by phone.

Make sure you utilize and regularly update anti-virus, anti-spyware and firewall software in order to protect your computer. Many " phishing" e-mails contain software that tracks your online activity or cause damage to your computer.

Forward suspicious e-mails to the institution that they supposedly represent. Large organizations have more resources for effectively reporting potential scammers to the proper authorities.

Any e-mail asking you to validate or confirm sensitive information like a social security number or bank account should be regarded as suspicious. By becoming a wary internet user, you could be protecting yourself from a potential predator, and ultimately, identity theft.

Comments (1)

TJ1311
check out projecthoneypot.org for monitoring your IP address and/or router for spam, malicious content and otherwise. spam, phishing and unsolicited junk email is considered a felony in the 21st century.

Would YOU like to publish an article on Connecting Singles?

Would YOU like to publish an article on Connecting Singles? Are you an expert at something, have an interesting story, or a good lesson to teach... why not share with other members. If you have experience or expertise in a topic that will be of interest to CS members, you may submit an article to be published on the site.
Post your own Article »

Attention: Report Abuse. If this article is inappropriate please report abuse.
We use cookies to ensure that you have the best experience possible on our website. Read Our Privacy Policy Here