Their Phishing For Your Identity
Computers & Technology → Internet
- Author Johnny Mendel
- Published May 6, 2009
- Word count 501
Who hasn't received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient "take me there" link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been "phished".
Phishing (pronounced as "fishing") is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.
It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.
Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse.Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.
Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.
The author Johnny Mendel manages the computer repair and PC repair website that provides access to quality low priced PC and laptop repair products online. You can also get great free information articles on Johnny's site.
Article source: https://art.xingliano.comRate article
Article comments
There are no posted comments.
Related articles
- Unlocking Profits: How Anyone Can Make Money with ChatGPT in 2025.
- Ask AI: The Revolutionary Domain That's Reshaping How We Access Intelligence
- What Is a Cold Wallet? A Beginner’s Guide to Offline Crypto Security
- Best Internet Provider Freiburg – Fast Fiber Optic Internet with Unitemobile Freiburg
- Why Do You Need Managed IT Services in Washington, DC? Reasons and Benefits
- Custom Domain Landing Page
- How We Built an Accurate MAC Address Lookup Tool (And How You Can Use It)
- Is Your DNS Hiding Something? Uncover It in Seconds
- Complete Guide to IP Address Lookup: What You Need to Know
- Say Goodbye to Bookmark Chaos: Meet ToffeeTabs
- Top Free Tools for Investigating Network Threats in 2025
- How Website Maintenance & Security Protects Your Online Presence
- Free Proxy Servers: How They Work and Where to Find Them
- USA's Most Trusted VPN for Android in 2025: Secure Your Privacy Today
- How to Get the Best Performance from Your DISH Internet Connection
- Unleash Your Online Potential: Build a Stunning Website or E-commerce Store with Ieros Web Agency
- Closing the Digital Gap: The Rural Internet Revolution
- What is DuckDuckGo?
- What is CCTLD?
- Gulf Website Hub Reveals Fresh Digital Solutions to Enhance Dubai's Expanding Market.
- Embrace Multi Graphics Inc. Expands Services to Meet Growing Demand in Digital Marketing, Design, and Printing
- Website Development Trends in 2025
- Viewing Instagram Stories Without an Account: Imginn Viewer Insights
- How to Find, Use, and Manage BitLocker Recovery Keys on Windows 10/11
- Building a Professional Website on a Budget: Using Free Tools like WordPress and AI
- Ava Labs CEO On Why You Shouldn't Ignore Red Flags In The Industry
- Cyberbullying: Empowering Families to Safeguard Their Kids
- 10 Common Online Scams to Avoid: Protecting Your Identity and Finances
- Spring Break and Staying Secure Online: An Internet Safety Guide for College Students
- Unveiling the Future: The 10 Revolutionary Trends Shaping Small E-Commerce Businesses in 2024