A:

The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's personal or financial information through the use of the internet or another mobile communication device. Here's the typical way that it works:

  • An individual receives an email which appears to originate from a financial institution, government agency, or a credible institution or company with which you may do business.

  • The message describes an urgent reason that you must "verify" or "re-submit" personal or confidential information by responding in electronic format via a link.

  • The link will take you to a website that appears to look like the reputable organization, but it is actually a website that belongs to the scammer or criminal.

  • Once you are taken to the fraudulent website, you could be asked to provide certain information such as: driver's license number, account numbers, passwords, social security numbers, date of birth and other confidential information.

  • When the individual provides the information, the criminals will then utilize this information to steal your identity by gaining access to personal accounts.

Some of the common "phishing scams" are found in emails that appear to be from someone that you might know, a social networking website, fake websites that accept donations for charities, your instant messaging program and on a cell phone or other mobile device.

Your first level of defense against these scam artists and various other malicious software out there, is to secure your computer by keeping your operating system up-to-date, installing anti-virus software and anti-spyware software. The second level is to be smart and avoid giving any personal information across the internet. If you happen to receive an email that you suspect is a phishing scam, you should contact the real organization immediately and also contact the InternetCrimeComplaintCenter (www.ic3.gov), which is a partnership between the FBI, the NationalWhiteCollarCrimeCenter and the Bureau of Justice Assistance.

Information stolen by hackers can be used to steal your indentity, read Indentity Theft: How To Avoid It to learn ways to safeguard your sensitive information.

The question was answered by Steven Merkel.

RELATED FAQS
  1. What are the warning signs of online hotel / travel booking scams?

    Learn more about travel booking scams and how to avoid them. Explore warning signs of possible booking scams, and find out ... Read Answer >>
  2. How does a pump and dump scam work?

    A pump and dump scam is the illegal act of an investor or group of investors promoting a stock they hold and selling once ... Read Answer >>
  3. What are the dangers of using the Electronic Federal Tax Payment System (EFTPS)?

    The Electronic Federal Tax Payment System (EFTPS) is a convenient way to file your taxes, but you need to be aware of some ... Read Answer >>
  4. What is the doctor advisory scam?

    U.S. securities law provides certain exemptions that allow privately owned companies to issue shares of unregistered stock ... Read Answer >>
Related Articles
  1. Investing

    5 New Phishing Scams To Watch Out For

    These five scams may seem transparent, but thousands of people fall for them annually.
  2. Investing

    What Is Phishing?

    Find out more about this scam and how to avoid it.
  3. Insights

    Watch Out For These Top Internet Scams

    The Internet had make it easier than ever for scammers to trick people into giving away their money and personal information. These are the scams to avoid.
  4. Tech

    Cybersecurity: Protect Yourself This Tax Season

    Take a little extra time to review online communications and avoid becoming a cybercrime victim.
  5. Insights

    10 Tips To Avoid Common Financial Scams

    Remember that "don't talk to strangers" rule from childhood? Well, don't wire them money either. Or fall for these other tricks.
  6. Personal Finance

    6 New Credit Scams To Watch Out For

    It seems that everyone has their hand in your pocket these days. Learn how to protect yourself against these financial scams.
  7. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  8. Taxes

    Know the Latest IRS Scams

    How do IRS scammers go about stealing your personal information? Their methods include hacking, malicious software and psychological manipulation.
  9. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  10. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
RELATED TERMS
  1. Phishing

    A method of identity theft carried out through the creation of ...
  2. Reloaded

    A slang term meaning that a consumer who was previously defrauded ...
  3. Nigerian Scam

    A scam where the sender requests help in facilitating the transfer ...
  4. Spoofing

    A type of deception where an intruder attempts to gain unauthorized ...
  5. Bottom-Dollar Scam

    Fraudulent claims by swindlers or con artists who prey on job ...
  6. Confidentiality Agreement

    A legal agreement between two or more parties that is used to ...
Hot Definitions
  1. Taxable Income

    Taxable income is described as gross income or adjusted gross income minus any deductions, exemptions or other adjustments ...
  2. Chartered Financial Analyst - CFA

    A professional designation given by the CFA Institute (formerly AIMR) that measures the competence and integrity of financial ...
  3. Initial Coin Offering (ICO)

    An Initial Coin Offering (ICO) is an unregulated means by which funds are raised for a new cryptocurrency venture.
  4. The Bernie Madoff Story

    Bernie Madoff ran a multibillion-dollar Ponzi scheme that is considered the largest financial fraud of all time.
  5. Pyramid Scheme

    An illegal investment scam based on a hierarchical setup. New recruits make up the base of the pyramid and provide the funding, ...
  6. Ponzi Scheme

    A fraudulent investing scam promising high rates of return with little risk to investors. The Ponzi scheme generates returns ...
Trading Center