Web Hosting Security

  Home arrow Web Hosting Security arrow How to Stop Phishing Scams
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

How to Stop Phishing Scams
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 4
    2012-04-18

    Table of Contents:

    Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement
    Do phishing scams have you paranoid about surfing the Web? They should not, as they can be stopped, and this article will tell you how.

    We previously covered the topic of phishing by giving you a basic definition of what it is.  To review, phishing is basically an instance where a potential victim is contacted, usually by email or telephone, by a party posing as a legitimate institution in order to trick the target into handing over sensitive information. 

    In addition to offering a basic overview of what phishing is, we also told you the different ways to detect a phishing scam.  In particular, we discussed the telltale signs that are commonly found in phishing emails.  Among these characteristics are a sense of urgency, an offer that is too good to be true, randomly generated names, poor grammar and spelling, and malicious links to infected websites.

    With a basic understanding of phishing scams and how to detect them, now is the time to learn how to stop them or prevent them from creating chaos not only for your computer, but also your personal life.  After all, these scams happen for a reason, and many times that reason is to pad the pockets of cybercriminals with your hard-earned money. 

    So, let us now take a look at how you can not only stop phishing scams, but also report them to help keep them from affecting new victims.

    Whether you are an expert Web surfer or a complete newbie, you will come across a phishing scam at one point or another during your online time.  Some of these scams are very crafty and well-designed, so they might catch you if you are not paying attention.  To help you out, here are tips that you can implement to your everyday surfing activities to avoid these scams.

    Stay Protected

    Use trusted up-to-date antivirus software and a firewall to provide a barrier between you and cybercriminals. 

    Updates, Updates, Updates

    Whether it is antivirus software, your browser, operating system, or applications, you need to keep everything updated.  Vendors send out patches to fix detected vulnerabilities that hackers can exploit.  It may be annoying, but updating is essential to your online protection against phishing and other cyber crime. 

    Leverage the Power of Nifty Toolbars

    Many popular browsers now offer the extended functionality of toolbars that can detect phishing sites.  The toolbars check the site you are visiting against a blacklist of known phishing sites to tell you if you are safe.

    Check Site Security

    Whenever you are entering in personal information, such as a password, banking information, credit card information, and the like, you want to make sure the site is properly secured so your information will not be leaked to others.  There are a few things to look for to determine this.  First, make sure that the “https” prefix is in the URL.  Second, look for a little icon of a closed lock that means your connection is encrypted.  Depending on your browser, you can click on the icon to see the site’s security details.

    Manage Popups Properly

    Popups are not only irritating, but they can also be dangerous.  Some come in the form of scareware that tricks you into thinking your computer is infected.  Others offer phony rewards if you fill out phishing forms with your personal information.  Use a popup blocker in your browser to keep popups at a minimum.  If one does appear, avoid clicking options like “OK” or “Cancel” as these could just lead you into a phishing scheme or infected site.  Either close out your browser, or click the X in the top right corner to exit the popup.

    Watch Where You Click

    It may be tempting to click a lot of links when you surf the Web, but it is not a very good habit to have.  Creators of phishing and other scams know what tempts users, and they leverage this knowledge to devise schemes to get you to click links that lead to sites that try to phish your information.  Clicking links on a trusted site is fine, but clicking them on an unknown site, in email, or in instant messages could land you in trouble.  Remember to always hover over a link to see exactly where it leads you, as some links will be disguised and will actually take you to a different site than promised.

    Keep Your Information to Yourself

    Do you want to make sure phishing attacks never compromise your personal information?  If so, keep it to yourself, especially when wandering into unknown territory.  If you do not disclose any personal information on the internet, you do not have to worry about anyone getting their hands on it.  This goes for telephone calls as well.  You never know who is on the other end.  It is better off to call an institution directly or visit their official website and do your business from there.  Never, ever disclose information via email, instant messaging, etc.

    Read Up on New Phishing Trends

    As internet security companies and users out certain phishing scams, it becomes time for cybercriminals to change up their game plans.  A stale scam has less of a chance to be successful as a new one, so new scams are constantly popping up around the online community.  You can keep yourself educated on new phishing scams by doing periodic checks for news on the topic.  A simple search in Google News for the term “phishing” should bring up plenty of news articles that detail newly detected scams.  By being educated on the subject, you will be able to spot phishing scams easily and stop them from tricking you.

    Perform Account Maintenance

    Account maintenance means checking your online accounts periodically to look for any unusual behavior.  This mostly pertains to financial accounts (banking, credit cards, PayPal, etc.), but you should also do it for email accounts and social networking to make sure they are not compromised and being used to send out spam.  A solid maintenance practice is to change your passwords frequently to keep hackers at bay.  Do not use the same password on multiple sites, however.

    Use Common Sense

    Nobody is going to give you free electronics and lottery prizes just for surfing the Web.  Avoid these offers.  If it seems too good to be true, it probably is.  Use your instincts when surfing online just as you would in the real world. 

    Report Phishing Scams

    If you come across a phishing scam, report it and do your part to derail these scammers from affecting more victims.  Some email services allow you to mark messages as phishing scams, such as Hotmail.  You can also report phishing scams to certain websites dedicated to stopping them.  Here are two links to do so:

    United States Computer Emergency Readiness Team - http://www.us-cert.gov/nav/report_phishing.html

    Anti-Phishing Working Group - http://www.antiphishing.org/report_phishing.html


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou

    antalya escort bayan escort antalya escort

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2014 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap