A:

The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's personal or financial information through the use of the internet or another mobile communication device. Here's the typical way that it works:

  • An individual receives an email which appears to originate from a financial institution, government agency, or a credible institution or company with which you may do business.

  • The message describes an urgent reason that you must "verify" or "re-submit" personal or confidential information by responding in electronic format via a link.

  • The link will take you to a website that appears to look like the reputable organization, but it is actually a website that belongs to the scammer or criminal.

  • Once you are taken to the fraudulent website, you could be asked to provide certain information such as: driver's license number, account numbers, passwords, social security numbers, date of birth and other confidential information.

  • When the individual provides the information, the criminals will then utilize this information to steal your identity by gaining access to personal accounts.

Some of the common "phishing scams" are found in emails that appear to be from someone that you might know, a social networking website, fake websites that accept donations for charities, your instant messaging program and on a cell phone or other mobile device.

Your first level of defense against these scam artists and various other malicious software out there, is to secure your computer by keeping your operating system up-to-date, installing anti-virus software and anti-spyware software. The second level is to be smart and avoid giving any personal information across the internet. If you happen to receive an email that you suspect is a phishing scam, you should contact the real organization immediately and also contact the InternetCrimeComplaintCenter (www.ic3.gov), which is a partnership between the FBI, the NationalWhiteCollarCrimeCenter and the Bureau of Justice Assistance.

Information stolen by hackers can be used to steal your indentity, read Indentity Theft: How To Avoid It to learn ways to safeguard your sensitive information.

The question was answered by Steven Merkel.

RELATED FAQS
  1. What exactly is insider trading?

    An "insider" is any person who possesses at least one of the following: 1) access to valuable non-public information about ... Read Answer >>
  2. What are some high-profile examples of wash trading schemes?

    Examine the RBC Bank wash trading case and explore the potential wash trading challenges presented by high-frequency trading ... Read Answer >>
  3. How should a whistleblower report unlawful or unethical behavior?

    Read about the nature of whistleblowing, its possible consequences, and how to know the best way to alert the authorities ... Read Answer >>
  4. How do insurance companies use a whistleblower?

    Read about the practice of whistleblowing to help insurance companies detect and prevent fraudulent insurance claims or recoup ... Read Answer >>
  5. What are examples of inherent risk?

    Explore two famous examples of inherent risk with the collapse and ultimate bankruptcy of Lehman Brothers and the downfall ... Read Answer >>
  6. What were the primary financial crimes involved in the ZZZZ Best case?

    Learn about the primary financial crimes involved in the ZZZZ Best case, one of the most notorious episodes of accounting ... Read Answer >>
Related Articles
  1. Active Trading Fundamentals

    The Short and Distort: Stock Manipulation in a Bear Market

    High-quality stock reports needn't be confused with stock manipulators' dramatic claims.
  2. Term

    What's Anti-Money Laundering?

    Anti-money laundering involves the laws and regulations designed to prevent criminals from generating income through illegal activities.
  3. Investing News

    GM's 4th Ignition Switch Case Dismissed (GM)

    The sooner GM can put these cases behind it and start building better/safer cars, the quicker it can grow the business and return value to shareholders.
  4. Credit & Loans

    5 ATM Scams That Can Break The Bank

    Don't get scorched by ATM thieves who want to burn a hole in your wallet.
  5. Credit & Loans

    10 Reasons To Use Your Credit Card

    Charging purchases is not always a no-no. In fact, there are some very sound reasons for choosing this option.
  6. Your Clients

    Top Ways to Guard Against Financial Elder Abuse

    Financial elder abuse is rampant. Here are some steps that you and your family can take to help guard against financial scams that target older investors.
  7. Investing News

    Cybercrime: #1 Disruptive Threat to Markets? (JPM)

    Discover why asset managers see cybercrimes as the most disruptive threat facing financial markets and learn what is being done to protect your data.
  8. Savings

    5 ATM Scams That Can Break The Bank

    Here are five common ways ATM users get ripped off.
  9. Economics

    Why Enron Collapsed

    Enron’s collapse is a classic example of greed gone wrong.
  10. Professionals

    4 Must Watch Films and Documentaries for Accountants

    Learn how these must-watch movies for accountants teach about the importance of ethics in a world driven by greed and financial power.
RELATED TERMS
  1. Money Laundering

    Money laundering is the process of creating the appearance that ...
  2. Racketeering

    A fraudulent service built to serve a problem that wouldn't otherwise ...
  3. Black Money

    Money earned through any illegal activity controlled by country ...
  4. Credit Card Dump

    The unauthorized copying of all the information contained in ...
  5. PIN Cashing

    A type of fraud in which a stolen credit card or debit card is ...
  6. Carding Forum

    A website dedicated to the sharing of stolen credit card numbers. ...

You May Also Like

Hot Definitions
  1. Keynesian Economics

    An economic theory of total spending in the economy and its effects on output and inflation. Keynesian economics was developed ...
  2. Society for Worldwide Interbank Financial Telecommunications ...

    A member-owned cooperative that provides safe and secure financial transactions for its members. Established in 1973, the ...
  3. Generally Accepted Accounting Principles - GAAP

    The common set of accounting principles, standards and procedures that companies use to compile their financial statements. ...
  4. DuPont Analysis

    A method of performance measurement that was started by the DuPont Corporation in the 1920s. With this method, assets are ...
  5. Call Option

    An agreement that gives an investor the right (but not the obligation) to buy a stock, bond, commodity, or other instrument ...
  6. Economies Of Scale

    Economies of scale is the cost advantage that arises with increased output of a product. Economies of scale arise because ...
Trading Center