Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Internet & Online Businesses » Email » Article
 

'Spoofing', 'Phishing' and 'Link Altering' - Expensive Financial Traps




By DL Consultants, LLC

A growing rank of Internet crooks are now using new tricks called "phishing" and "spoofing" to steal your identity. Bogus e-mails that attempt to trick customers into giving out personal information are the hottest new scam on the Internet.

"Spoofing" or "phishing" frauds attempt to make internet users believe that they are receiving e-mail from a specific, trusted source, or that they are securely connected to a trusted web site, when that's not the case at all, far from it. Spoofing is generally used as a means to convince individuals to divulge personal or financial information which enables the perpetrators to commit credit card/bank fraud or other forms of identity theft.

In "email spoofing" the header of an e-mail appears to originate from someone or somewhere other than the actual source. Spam distributors often use email spoofing in an attempt to get their recipients to open the message and possibly even respond to their solicitations.

"IP spoofing" is a technique used to gain unauthorized access to computers. In this instance the unscrupulous intruder sends a message to a computer with an IP address indicating that the message is coming from a trusted source.

"Link alteration" involves the altering of a return internet address of a web page that's emailed to a consumer in order to redirect the recipient to a hacker's site rather than the legitimate site. This is accomplished by adding the hacker's ip address before the actual address in an e-mail which has a request going back to the original site. If an individual unsuspectingly receives a spoofed e-mail and proceeds to "click here to update" account information, for example, and is redirected to a site that looks exactly like a commercial site such as EBay or PayPal, there is a good chance that the individual will follow through in submitting personal and/or credit information. And that's exactly what the hacker is counting on.

How to Protect Yourself
• If you need to update your information online, use the same procedure you've used before, or open a new browser window and type in the website address of the legitimate company's page.
• If a website's address is unfamiliar, it's probably not authentic. Only use the address that you've used before, or better yet, start at the normal homepage.
• Most companies require you to log in to a secure site. Look for the lock at the bottom of your browser and "https" in front of the website address.
• If you encounter an unsolicited e-mail that requests, either directly or through a web site, for personal financial or identity information, such as Social Security number, passwords, or other identifiers, exercise extreme caution.
• Take note of the header address on the web site. Most legitimate sites will have a relatively short internet address that usually depicts the business name followed by ".com," or possibly ".org." Spoof sites are more likely to have an excessively long strong of characters in the header, with the legitimate business name somewhere in the string, or possibly not at all.
• If you have any doubts about an e-mail or website, contact the legitimate company directly. Make a copy of the questionable web site's URL address, send it to the legitimate business and ask if the request is authentic.
• Always report fraudulent or suspicious e-mail to your ISP.
• Lastly, if you've been victimized, you should file a complaint with the FBI's Internet Crime Complaint Center at http://www.ic3.gov.
 
 
About the Author
Help secure your home or business with professional CCTV surveillance equipment. We offer an extensive line of baby monitors, multi-location monitoring systems, infrared night vision cameras, video door phones, security DVRs, time lapse VCRs, security tips and much more. Free UPS ground shipping in the US.
http://www.VigilanceandSecurity.com

Article Source: http://www.simplysearch4it.com/article/31390.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/31390.html" as shown above and make it hyperlinked.



  
  Recent Articles
Email Marketing
by Vinay Choubey

Sending Email Courses With Autoresponders
by Dan Hartnett

Good Email Advertising
by Lance Brown

Building opt in list - effective internet marketing plan
by Eugenijus Sakalauskas

5 Tips To Help You Profit From Your Email List
by Daryl Campbell

Email Marketing: Money Is In The List!
by Jeffrey Greer

Email Marketing: On Keeping Online Businesses Profitable
by Eugenijus Sakalauskas

Are Your Emails Hazardous To Your Health?
by Mark McGimpsey

The 4 Ways to Get Your Subscribers to Trust You
by Daryl Campbell

Your Autoresponder Is The Most Important Tool For Generating Web Income
by Cynthia Minnaar

How to Write Effective Emails to Your List That will Make Your List Highly Responsive:
by Kim DeMonte

Boosting Business With Autoresponders
by Eugenijus Sakalauskas

Why You Should Build Your Opt-In E-mail Lists?
by Mohamad Zaki Hussein

Five reasons why email is the cheapest avenue for marketers
by Don Guindon

Automate Your Internet Business with Autoresponders
by Terri Seymour

Effective Email Marketing for your Business
by Steve Waganer

How To Tighten Up Your Email Security
by Paul Wilcox

A Good Idea - Use Email Marketing Software
by hamoon arbabi

Can't connect to database