What is a "phishing scam" and how can they be avoided?

By Steven Merkel AAA
A:

The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's personal or financial information through the use of the internet or another mobile communication device. Here's the typical way that it works:

  • An individual receives an email which appears to originate from a financial institution, government agency, or a credible institution or company with which you may do business.

  • The message describes an urgent reason that you must "verify" or "re-submit" personal or confidential information by responding in electronic format via a link.

  • The link will take you to a website that appears to look like the reputable organization, but it is actually a website that belongs to the scammer or criminal.

  • Once you are taken to the fraudulent website, you could be asked to provide certain information such as: driver's license number, account numbers, passwords, social security numbers, date of birth and other confidential information.

  • When the individual provides the information, the criminals will then utilize this information to steal your identity by gaining access to personal accounts.

Some of the common "phishing scams" are found in emails that appear to be from someone that you might know, a social networking website, fake websites that accept donations for charities, your instant messaging program and on a cell phone or other mobile device.

Your first level of defense against these scam artists and various other malicious software out there, is to secure your computer by keeping your operating system up-to-date, installing anti-virus software and anti-spyware software. The second level is to be smart and avoid giving any personal information across the internet. If you happen to receive an email that you suspect is a phishing scam, you should contact the real organization immediately and also contact the InternetCrimeComplaintCenter (www.ic3.gov), which is a partnership between the FBI, the NationalWhiteCollarCrimeCenter and the Bureau of Justice Assistance.

Information stolen by hackers can be used to steal your indentity, read Indentity Theft: How To Avoid It to learn ways to safeguard your sensitive information.

The question was answered by Steven Merkel.

RELATED FAQS

  1. How do regulators ensure that markets are conducted at arm's length?

    Learn about arm's length transactions and how the Investment Advisers Act allows stockbrokers to sell securities based on ...
  2. What is the difference between an in-store and an online payday loan?

    Learn important differences between online and in-store payday loan companies. Explore different charges made by companies ...
  3. What's the difference between legal defalcation and illegal defalcation?

    Discover what is meant by the term ''defalcation'' and how it can be used in multiple contexts to describe illegal or legal ...
  4. What are the most common scams regarding Social Security benefits?

    Learn about some of the most common Social Security scams that occur by phone, email and direct mail, and how to recognize ...
RELATED TERMS
  1. Card-Not-Present Fraud

    A type of credit card scam in which the customer does not physically ...
  2. Card-Present Fraud

    A type of credit card scam in which the card is physically presented ...
  3. Credit Fraud Alert

    A notice to a credit reporting bureau that a consumer’s identity ...
  4. Online Shoplifting

    The theft of goods from an Internet-based merchant.
  5. Bottom-Dollar Scam

    Fraudulent claims by swindlers or con artists who prey on job ...
  6. Zero Liability Policy

    A condition in a credit card agreement stating that the card ...

You May Also Like

Related Articles
  1. Economics

    America's Most Notorious Corporate Criminals

  2. Investing News

    Educating Your Clients About Cybersecurity

  3. Credit & Loans

    Are You A Target For Identity Thieves?

  4. Credit & Loans

    Avoid Becoming An Identity Thief's Next ...

  5. Investing News

    How The Patriot Act Works & Why Is It ...

Trading Center