Every day your email inbox contains dangerous email scams. But, as the scams – often consisting of “phishing” emails designed by identity thieves to steal your personal information – become more sophisticated, how can you tell a dangerous email from a legitimate one? identitytheft.info worked with Identity Theft Expert Bob Sullivan of MSNBC to create this video warning consumers about the dangers of “phishing” emails.
Just as we secure our homes from burglars seeking to physically break-in and steal our most valuable possessions, we must be equally vigilant in the 21st Century at protecting the valuable information stored on our computers from cybercriminals who constantly attempt to break-in by means of the Internet. And, just as we can deter most burglars from raiding our homes by making it more impenetrable than our neighbors, we can do the same when it comes to erecting defenses against identity thieves and other cybercriminals.
The first line of defense in Internet security is cybercrime awareness. By being aware of the various methods cybercriminals use to penetrate your computer and steal your personal information, you will increase the odds that you wont be a victim of identity theft or other forms of cybercrime.
One of the most common methods identity thieves and cybercriminals use to steal personal information is the use of phishing.
Phishing is a form of social engineering that uses email or instant messages that appear to be from a government agency, financial institution, Internet Service Provider (ISP), Internet-based company or any agency or business you trust and/or do business with. The intent of the phishing communication is to deceive you into divulging personal information such as web site usernames and passwords, credit card numbers, financial account numbers, Social Security numbers, dates of birth and any other form of personal or account information that an identity thief or cybercriminal can use to carry out criminal activity.
A phishing email will either entice you with the promise of money or appeal to your desire to protect your personal information by claiming that your account has been compromised. You will be advised to click on a link in the email in order to receive money or to provide information in order to secure or re-activate your account. The financial enticement or the advice to follow a link and provide additional information in order to secure or re-activate your account is the bait the cybercriminal dangles before you – hence the term phishing. By taking the bait and clicking on the link in a phishing email, you are exposed to at least two risks.
The first risk involved in clicking on any link in a phishing email is that you will be re-directed to a web site that will look similar or identical to the web site the cybercriminal is impersonating. Once at the site, you will be directed to provide personal information that will allow the identity thief or cybercriminal to steal that personal information and use it for financial fraud or other crimes.
The second risk involved in clicking on any link in a phishing email is that you will be activating the execution and installation of a virus that will be surreptitiously installed on your computer. The virus may steal the personal information stored on your computer by transmitting the personal information to the identity thief or cybercriminal who sent you the phishing email. The virus may also take over your computer and turn it into part of a botnet (malicious software robot network) designed to transmit other virus laden emails to thousands of other computers around the world.
The best way to avoid becoming an identity theft victim as the result of falling for a phishing email is to follow two rules. First, never trust an email you didnt request that directs you to provide information in order to obtain a benefit or to secure or re-activate an account. Second, if you do open an email that requests personal or financial information from you, never left-click on a link in the email.
No reputable business or agency will send you an unsolicited email requesting personal or financial information from you. If you believe the email might be legitimate, contact the sending business or agency either by using a web address you’ve previously bookmarked, one that you obtain independently from the email or by calling a phone number using a listing obtained independently of the email.
Remember: The greatest danger associated with a phishing email is from left-clicking on any links within the email. So think before you click. Better yet dont click at all.
To report a phishing email and help in the fight against identity theft and cyber crime click here.
For more information about phishing emails – and to see several examples of phishing emails commonly placed in circulation – please watch the video above produced by identitytheft.info in cooperation with consumer reporter Bob Sullivan of MSNBC.
Continue reading here:
Internet Security is an important part of Identity Theft …
- Internet Security Suite | Verizon Internet - September 20th, 2018
- Antivirus Security Software & Internet Security - Newegg.com - September 19th, 2018
- Amazon Best Sellers: Best Internet Security Suites - September 7th, 2018
- Download Bitdefender Internet Security 2019 126.96.36.199 - August 24th, 2018
- Best (and Worst) Internet Security Software of 2018 for Windows - August 18th, 2018
- Amazon.com: Kaspersky Internet Security 2018 | 3 Device | 1 ... - August 8th, 2018
- AVG Internet Security - Free download and software reviews ... - August 3rd, 2018
- Top 3 Internet Security Software Suites Reviews ... - July 26th, 2018
- GRC | LeakTest -- Firewall Leakage Tester - July 26th, 2018
- V3 Internet Security | AhnLab - June 22nd, 2018
- Internet Security with Xfinity - Norton Security Online - June 17th, 2018
- Best Internet Security Software Compared - May 25th, 2018
- Computer and internet security software Chili Security - May 21st, 2018
- Internet Security Market Size, Share and Technology, 2021 - May 21st, 2018
- Center for Internet Security - Wikipedia - May 10th, 2018
- Download Webroot SecureAnywhere Antivirus & Internet ... - May 1st, 2018
- AVG Internet Security 2018 review | Ultimate antivirus ... - April 29th, 2018
- The Internet Security Academy - SAHCOM Technologies LLP - April 27th, 2018
- These files can't be opened. Your Internet security ... - April 20th, 2018
- How to Uninstall Norton Internet Security: 12 Steps - April 20th, 2018
- Internet Security Software at Office Depot OfficeMax - April 19th, 2018
- Why is Internet security important? | Reference.com - March 26th, 2018
- AVG Internet Security Unlimited 2018 18.2.3827 20% OFF ... - March 25th, 2018
- Trend Micro Titanium Internet Security - Download - March 21st, 2018
- Kaspersky Mobile Antivirus: AppLock & Web Security ... - March 21st, 2018
- Why do I Need Internet Security - The High Tech Society - March 21st, 2018
- Cincinnati Bell - Other Services Support - March 21st, 2018
- Internet Security Essentials for Business 2.0 | U.S ... - March 21st, 2018
- ESET Internet Security 10.0.386.0 Crack + License Keys ... - March 21st, 2018
- Privacy and Security in the Internet Age | WIRED - March 19th, 2018
- News & Events | K9 Web Protection - Free Internet Filter ... - March 19th, 2018
- 10 Internet Security Programs (for Windows), Ranked Best ... - March 7th, 2018
- AVG Internet Security 2015 Free Download - getintopc.com - March 3rd, 2018
- McAfee Internet Security Download - softpedia.com - February 28th, 2018
- COMODO Internet Security Download - softpedia.com - January 30th, 2018
- Best Internet Security Software 2018 - The best rated ... - January 28th, 2018
- Comodo Antivirus - Best Virus Removal Software 2018 - January 13th, 2018
- ZoneAlarm Antivirus Software | Virus Protection & Firewall - January 13th, 2018
- What Is the Meaning of Internet Security? | Techwalla.com - January 12th, 2018
- Download Avast Internet Security 17.7.2314 - FileHippo.com - January 12th, 2018
- Vipre Antivirus VIPRE Internet Security - January 12th, 2018
- AVG Internet Security 2018 License Key With Crack Full Version - January 8th, 2018
- CA Internet Security Suite Plus - Download - December 27th, 2017
- Collaborative Security: An approach to tackling Internet ... - December 27th, 2017
- Norton Internet Security - Download - December 20th, 2017
- Best Internet Security 2017 - Total Security Software for ... - December 20th, 2017
- Get the Best Internet Security Software of 2016! - December 20th, 2017
- Internet Security Administrator: Job Description and Requirements - December 19th, 2017
- Top 10 Cheap Antivirus and Internet Security Protection for ... - December 19th, 2017
- Download AVG Internet Security Unlimited - FileHippo.com - December 19th, 2017
- Norton Internet Security - softpedia.com - December 19th, 2017
- Internet Security - Cisco - December 19th, 2017
- Best Antivirus Software, Internet Security & Malware Removal - December 19th, 2017
- internet security | eBay - October 26th, 2017
- Avast Internet Security Download - softpedia.com - October 20th, 2017
- Internet Security Software | Trend Micro - October 3rd, 2017
- Lenovo Faces No Significant Penalty for Security-Destroying Superfish Debacle - ExtremeTech - September 7th, 2017
- 25% Upside Seen In Palo Alto, Argus Research Upgrades To Buy - Benzinga - September 5th, 2017
- How to: Your essential guide to internet security - PC Authority - September 5th, 2017
- Internet security startup founded by former CIA analyst raises $40 million - San Francisco Business Times - September 2nd, 2017
- CyberRehab's mission? To clean up the internet, one ASN block at a time - The Register - September 2nd, 2017
- Kaspersky Lab launched updated versions of Kaspersky Internet ... - Software Testing News - September 1st, 2017
- Cloud-based CAE HPC Partnership Focuses on Speed and Security of Data Transfer - ENGINEERING.com - September 1st, 2017
- China's cybersecurity law grants government 'unprecedented' control over foreign tech - The Register - September 1st, 2017
- Symantec CEO Sees Broad-Based Internet Security Threats - Bloomberg - August 31st, 2017
- Expert warns sexting is seen as normal by many young people - Evening Echo Cork - August 31st, 2017
- Internet Explorer - Wikipedia - August 30th, 2017
- Your essential guide to internet security - IT PRO - August 30th, 2017
- DUO to increase student internet security - The Crimson While - August 30th, 2017
- Online threats lead to real-world harm, say security experts - CNBC - August 30th, 2017
- Net neutered: When ISPs like Comcast crash the cloud - ZDNet - August 30th, 2017
- Upgrade your internet security with Private Internet Access VPN ... - Popular Science - August 28th, 2017
- Internet 101 Survey results show disconnect between confidence and Internet user knowledge - TechSpot - August 28th, 2017
- Leak of >1700 valid passwords could make the IoT mess much worse - Ars Technica - August 27th, 2017
- How to Choose the Best Internet Security Software? | Bdaily - Bdaily - August 25th, 2017
- China overtakes Belgium on world innovation index - TechNode (blog) - August 25th, 2017
- Zephyr Cove internet security company enters into Paten Standstill Agreement - Northern Nevada Business Weekly - August 25th, 2017
- Internet key to farm security, farmer Bruce Crafter says at Farm Security and Farmers Health Expo in Bendigo - Bendigo Advertiser - August 25th, 2017
- Q2 2017 Akamai State Of The Internet / Security Report Analyzes Re-Emergence Of PBot Malware; Domain Generation ... - PR Newswire (press release) - August 25th, 2017
- OneLogin is Changing How We Think About Internet Security - HiTechChronicle - August 25th, 2017