Spam and phishing: be careful

Posted: February 20, 2013 in Articles
Tags: , , , , ,

Spam and phishingSpam has become so commonplace for all that many on it almost stopped paying attention.

However, this is not a reason to be vigilant, as there are two types of fraud with spam, known as “phishing” and “spoofing” (from the English. Fishing and spoofing, respectively). Both of these methods involve the use of fake e-mail messages in which the “from:” field contains a forged sender information.

What is phishing?

Phishing e-mails are used to lure the user’s personal data, as well as information about his account. Also they can be used to force a user to download malicious software. Often in such reports suggest some that require immediate attention to problems with the account of the recipient. The letter will contain a link that leads to a fake website where you are asked to provide personal information, account information, or download a program, which is usually masked by the virus.

What differs phishing from spoofing?

Fake emails often contain fraudulent offers of employment and / or invitations to act as an intermediary in the processing of certain payments or transfers. This scam is aimed at a wide audience, that does not mean that you will never run with him, and is intended for the recipient natural greed, because it contains very favorable at first glance the proposal. As well as in phishing messages, e-mail address of the sender when it is hidden or falsified.

How to avoid becoming a victim of fraud?

The number and sophistication of electronic fraud is growing at huge rates. Despite the fact that the safety of the use of online banking and e-commerce is at a very high level, you should be careful when sending over the Internet your personal and financial data.

Here are some recommendations.

- Be very suspicious of any e-mails with requests to provide urgent personal, financial or other data of this nature;

- Usually, in his letters, phishers use frightening and attracting (false) statements in order to obtain an immediate response from the user;

- As a rule, you will be asked to provide information such as user name, password, credit card number, date of birth, etc.
- Do not open links in e-mail, chat rooms or Internet Messaging (ICQ, MSN Messenger, etc.), if you have any suspicions as to their origin;

- When you receive such messages, you need to contact the company by phone or connect to the site through a browser;

- To transfer information, such as credit card numbers, account information or other sensitive information is allowed only through a secure website or over the phone, when you are absolutely sure that it is pass it to the person to whom you think;

- Before you submit your credit card number or other information that are of special significance, through a browser, make sure you use a secure Web site.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s