What is a "phishing scam" and how can they be avoided?

By Steven Merkel AAA
A:

The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's personal or financial information through the use of the internet or another mobile communication device. Here's the typical way that it works:

  • An individual receives an email which appears to originate from a financial institution, government agency, or a credible institution or company with which you may do business.
  • The message describes an urgent reason that you must "verify" or "re-submit" personal or confidential information by responding in electronic format via a link.
  • The link will take you to a website that appears to look like the reputable organization, but it is actually a website that belongs to the scammer or criminal.
  • Once you are taken to the fraudulent website, you could be asked to provide certain information such as: driver's license number, account numbers, passwords, social security numbers, date of birth and other confidential information.
  • When the individual provides the information, the criminals will then utilize this information to steal your identity by gaining access to personal accounts.

Some of the common "phishing scams" are found in emails that appear to be from someone that you might know, a social networking website, fake websites that accept donations for charities, your instant messaging program and on a cell phone or other mobile device.

Your first level of defense against these scam artists and various other malicious software out there, is to secure your computer by keeping your operating system up-to-date, installing anti-virus software and anti-spyware software. The second level is to be smart and avoid giving any personal information across the internet. If you happen to receive an email that you suspect is a phishing scam, you should contact the real organization immediately and also contact the InternetCrimeComplaintCenter (www.ic3.gov), which is a partnership between the FBI, the NationalWhiteCollarCrimeCenter and the Bureau of Justice Assistance.

Information stolen by hackers can be used to steal your indentity, read Indentity Theft: How To Avoid It to learn ways to safeguard your sensitive information.

The question was answered by Steven Merkel.

RELATED FAQS

  1. What was the Mahonia company and why did it become the subject of a lawsuit?

    In 1992, J.P.Morgan went into the energy trading business by creating a venture company called Mahonia Limited. At least, ...
  2. What are the dangers of using the Electronic Federal Tax Payment System (EFTPS)?

    The Electronic Federal Tax Payment System (EFTPS) is a convenient way to file your taxes, but you need to be aware of some ...
  3. Am I responsible for fraudulent charges on my credit card?

    In the event that your credit card is stolen in the United States, federal law limits the liability of card holders to $5 ...
  4. Excessive trading is:

    A. acceptable if the client is young enough to recover from any losses before retiring.B. acceptable if the firm mandates ...
RELATED TERMS
  1. Banker Trojan

    A malicious computer program designed to gain access to confidential ...
  2. Black Market

    Economic activity that takes place outside government-sanctioned ...
  3. Bear Raid

    The illegal practice of ganging up to push a stock's price lower ...
  4. Cookie Jar Accounting

    A disingenuous accounting practice in which periods of good financial ...
  5. Financial Shenanigans

    Acts or actions designed to mask or misrepresent the true financial ...
  6. Facilitating Payment

    A financial payment that may constitute a bribe and that is made ...
comments powered by Disqus
Related Articles
  1. Consumer Protection Laws You Need To ...
    Personal Finance

    Consumer Protection Laws You Need To ...

  2. Credit Scams To Watch Out For
    Insurance

    Credit Scams To Watch Out For

  3. What You Need To Know About Insurance ...
    Insurance

    What You Need To Know About Insurance ...

  4. What Investors Can Learn From Insider ...
    Markets

    What Investors Can Learn From Insider ...

  5. Identity Theft: How To Avoid It
    Insurance

    Identity Theft: How To Avoid It

Trading Center