Phishing Scams Tips and Tricks

How to Detect Phishing Scams by Kelly Lynn

Phishing is a form of online scam that attempts to collect personal and financial information from intended targets. It accomplishes this through subtle persuasion by stressing upon the target the urgency of a particular problem or situation that requires immediate action from the target. The situation presented is usually security related which counts on our fear of having our online security compromised. The problem that is presented is always bogus in a phishing scam but since some people are not aware that such scams exist, some do take the bait every now and then. The Scam Let us look at an example of how a scam is executed. You’ll receive an e-mail message from a seemingly known and reputable company such as a bank, an online site or some other … Continue reading

The Facebook Phishing Spam I Almost Fell For by Kelly Lynn

I was going through my morning emails today and received an email which appeared to be a typical Facebook message... From: Facebook Subject: Amanda Trevino commented on your photo Date: November 24, 2010 9:55:08 AM PST To: Kelly Lynn With the message content as: Amanda Trevino commented on your photo. To see the comment thread, follow the link below: Thanks, The Facebook Team I believe this is exactly how real, legitimate Facebook photo comment emails look like. In addition, even though I do not know an Amanda Trevino (although it's a common sounding name), it is entirely possible for people to comment on your photos even if they're not on your friends list. Another factor that likely came into play is related to the type of email it was. … Continue reading

4 Big Tips to Save You From an Email Phishing Scam by Kelly Lynn

I'm not one to normally provide advice on online safety but I recently learned some very helpful tips from a friend that I thought are worth sharing.  Phishing is one of the largest online threats on the Internet.  For those of you that are not familiar with the term phishing, it's basically when someone attempts to capture your sensitive information (usernames, passwords, bank or credit card information, etc.). The threat usually originates from an email.  Let me show you an example. Here is an email that I received which appears to be from Amazon (not shown in it's entirety): It appears to be an order confirmation that I would have actually received from Amazon if I had placed an order with them.  It is the EXACT same template that Amazon … Continue reading