{"id":6954,"date":"2019-10-05T22:20:20","date_gmt":"2019-10-05T22:20:20","guid":{"rendered":"http:\/\/on-line-interactivity.com\/blog\/2019\/10\/05\/identity-theft-article-a-phisher-i\/"},"modified":"2019-10-05T22:20:20","modified_gmt":"2019-10-05T22:20:20","slug":"identity-theft-article-a-phisher-i","status":"publish","type":"post","link":"https:\/\/on-line-interactivity.com\/blog\/identity-theft-article-a-phisher-i\/","title":{"rendered":"Identity Theft Article    A Phisher I"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><body>&#13;<\/p>\n<div align=\"center\">&#13;<\/p>\n<p><a href=\"https:\/\/on-line-interactivity.com\">&#13;<br \/>\n  <img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/on-line-interactivity.com\/blog\/wp-content\/uploads\/2019\/12\/abbtop.jpg\" width=\"800\" height=\"120\"\/><\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/p>\n<p>&#13;<\/p>\n<table width=\"800\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tr>\n<td colspan=\"2\">&#13;<br \/>\n\t  &#13;<\/p>\n<div align=\"center\">&#13;<br \/>\n\t     <script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 728;\ngoogle_ad_height = 90;\ngoogle_ad_format = \"728x90_as\";\ngoogle_ad_type = \"text_image\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"336699\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n         ]]><\/script>   &#13;<br \/>\n\t  \u00a0<\/div>\n<\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<tr>\n<td width=\"260\" valign=\"top\">\n<p>\u00a0&#13;<br \/>\n\t  &#13;<br \/>\n\t  &#13;\n\t  <\/p>\n<div align=\"left\"><span class=\"style23\">&#13;<\/p>\n<p align=\"left\" class=\"style23\">Article Navigation <\/p>\n<p>&#13;<br \/>\n        <a href=\"index.html\"><font size=\"3\">Back To &#13;<br \/>\n          Main Page <\/font> <\/a> &#13;<\/p>\n<p\/><\/span><\/div>\n<p>&#13;<\/p>\n<p align=\"left\"\/>\n<hr\/>\n<p align=\"left\"><script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 250;\ngoogle_ad_height = 250;\ngoogle_ad_format = \"250x250_as\";\ngoogle_ad_type = \"text\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"FFFFFF\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n            ]]><\/script><\/p>\n<p>&#13;<br \/>\n            \u00a0<\/p>\n<p align=\"left\"><b><a href=\"index.html\"><font size=\"4\">&#13;<br \/>\n      <span style=\"background-color: #FF6600\">Click Here<\/span><\/font><\/a><\/b><font size=\"4\"><span style=\"background-color: #FF6600\"> &#13;<br \/>\n      for more articles<\/span><\/font><\/p>\n<\/td>\n<p>&#13;<\/p>\n<td width=\"514\" valign=\"top\">\n<div align=\"left\">&#13;<\/p>\n<table width=\"99%\" height=\"114\">\n<tr>\n<td height=\"45\"><span class=\"style7\"><!-- Search Google -->&#13;<br \/>\n<center>&#13;<\/p>\n<form method=\"get\" action=\"http:\/\/www.google.com\/custom\" target=\"_top\">&#13;<\/p>\n<table bgcolor=\"#ffffff\">\n<tr>\n<td nowrap=\"nowrap\" valign=\"top\" align=\"left\" height=\"32\">&#13;<br \/>\n<a href=\"http:\/\/www.google.com\/\">&#13;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.google.com\/logos\/Logo_25wht.gif\" border=\"0\" alt=\"Google\" align=\"middle\" width=\"75\" height=\"32\"\/><\/a>&#13;<br \/>\n<input type=\"text\" name=\"q\" size=\"31\" maxlength=\"255\" value=\"\"\/><input type=\"submit\" name=\"sa\" value=\"Search\"\/><input type=\"hidden\" name=\"client\" value=\"pub-5712520513640847\"\/><input type=\"hidden\" name=\"forid\" value=\"1\"\/><input type=\"hidden\" name=\"ie\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"oe\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"cof\" value=\"GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;\"\/><input type=\"hidden\" name=\"hl\" value=\"en\"\/><\/td>\n<\/tr>\n<\/table>\n<\/form>\n<p>&#13;<br \/>\n<\/center>&#13;<br \/>\n<!-- Search Google -->&#13;<br \/>\n<\/span><\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"22\">\n<div align=\"justify\"><span class=\"style7\">&#13;<br \/>\n                <font color=\"#FB7014\" size=\"4\" face=\"Tahoma\">Identity Theft Article &#8211;  A Phisher Is Trying To Steal Your Identity!<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"19\">\n<div align=\"justify\"><span class=\"style2\">by: &#13;<br \/>\n                <font size=\"3\" face=\"Times New Roman\" color=\"#FB7014\">Lisa Smith<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<div id=\"article\">\n<td align=\"left\" height=\"12\"><span class=\"style2\">Identity Theft Article  &#13;&#13;<br \/>\nA Phisher Is Trying To Steal Your Identity!&#13;&#13;<br \/>\nSooner or later everyone with an email account will receive a phishing attempt from some internet scammer.  What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity.&#13;&#13;<br \/>\n<br \/>The Anti-Phishing Working Group estimates that 75 million to 150 million phishing emails are sent every day on the internet. Phishing (pronounced fishing), is online identity theft that uses spoof emails, fraudulent websites and crimeware to trick unsuspecting internet users into providing financial data, credit card numbers, social security numbers, account logins and passwords, etc.&#13;&#13;<br \/>\n<br \/>A spoofed email looks like it is from a legitimate company, usually banks, credit card companies, paypal, ebay, etc. These fraudulent emails look like they are from the \u0093real\u0094 company, and generally try to get you to log into your account through the links in the email.  The spoof email may state that there is a problem with your account and if you do not log in and update your information your account may be suspended, restricted, closed, etc. Generally these emails try to convey a sense of urgency; if you don\u0092t correct this problem your account will be suspended.&#13;&#13;<br \/>\n<br \/>Trojans are increasingly being used as a phishing technique according to Sophos, a security firm. The Brizilian police recently arrested a phishing gang of 18 people who stole $37M from online banking accounts. This phishing gang would send out emails that included Trojans. Once a Trojan infects your computer, all internet activity can be monitored and transferred to the phisher. This is a serious threat as you probably won\u0092t know that you are infected with a Trojan.&#13;&#13;<br \/>\n<br \/>According to David Jevans, Chairman of APWG, \u0093Attacks can, and are, coming in a variety of other flavors.  Instant Messaging, exploited websites, P2P networks, and search engines are all being used to download and run key logging malcode and\/or be directed to websites which may contain malcode or be fraudulent. Attackers are also not just interested in username and password access to bank accounts. Social security numbers, credit cards and other identity information are also being stolen.\u0094 &#13;&#13;<br \/>\n<br \/>Protecting yourself against phishing scams.&#13;&#13;<br \/>\n<br \/>\u0095\tDo not give out personal or financial information through an email request. &#13;&#13;<br \/>\n<br \/>\u0095\tAlways log on to your sensitive accounts by opening a new browser and typing the actual URL directly into the address bar. For example, if you receive a suspected phishing email from ebay, open a new browser and type www.ebay.com in the browser bar. &#13;&#13;<br \/>\n<br \/>\u0095\tDo not click on any link in a suspected phishing email. &#13;&#13;<br \/>\n<br \/>\u0095\tOnly use a secure website to submit sensitive data. A secure sites\u0092 address will begin with \u0093https:\/\/\u0094 instead of \u0093http:\/\/\u0094 &#13;&#13;<br \/>\n<br \/>\u0095\tCheck the activity of your online accounts regularly. &#13;&#13;<br \/>\n<br \/>\u0095\tMake sure your browser is up to date and all security patches are installed. &#13;&#13;<br \/>\n<br \/>\u0095\tReport phishing and spoof email to:  reportphishing@antiphishing.com , spam@uce.gov, and forward the email to the company that is being spoofed. &#13;&#13;<br \/>\n<br \/>\u0095\tKeep your pc protected with updated anti-virus software, anti-spyware software, and a firewall. &#13;&#13;<br \/>\n<br \/>You may also want to install anti-phishing software. &#13;&#13;<br \/>\n<br \/>o\tEarthlink ScamBlocker is a free browser toolbar that alerts you to known phishing sites. It\u0092s free and can be downloaded at www.earthlink.net\/earthlinktoolbar.  &#13;&#13;<br \/>\n<br \/>o\tWebroot has a beta version of PhishNet which you can download at www.webroot.com\/products\/phishnet\/ &#13;&#13;<br \/>\n<br \/>o\tPC Tools Spyware Doctor offers protection against known phishing sites, spyware and blocks popups.&#13;&#13;<br \/>\n<br \/>With the consequences being identity theft, it is imperative that you learn to protect your pc and your identity by exercising caution and installing the proper tools. Hopefully, this identity theft article has given you the information you need to avoid being the next phishing victim.  Remember, legitimate companies don\u0092t ask for personal or financial information in an email \u0096 so don\u0092t give it to them!&#13;&#13;<\/p>\n<hr size=\"-1\"\/>&#13;<br \/>\n About the author:<\/p>\n<p>&#13;<br \/>\n  Lisa Smith is the webmaster of 1stSpywareRemoval.com, a website dedicated to helping people protect their online privacy. Subscribe to her free newsletter at http:\/\/www.1stSpywareRemoval.com&#13;<\/p>\n<p><font size=\"-2\">Circulated by <a href=\"http:\/\/www.geekzonehosting.com\">GeekZoneHosting.Com &#8211; Register a domain name and get hosting for your own Adsense Website just like this one<\/a><\/font>&#13;<\/p>\n<hr size=\"-1\"\/><\/span><\/td>\n<p>&#13;\n            <\/p><\/div>\n<\/tr>\n<\/table>\n<\/div>\n<p align=\"left\">\u00a0        <\/p>\n<p>&#13;\n      <\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<\/table>\n<hr width=\"800\" noshade=\"noshade\"\/><a href=\"https:\/\/on-line-interactivity.com\/ADSENSEWEBSITES\">RETURN TO ADSENSE BUSINESS-IN-A-BOX MASTER ARTICLE INDEX<\/a><\/p>\n<hr width=\"800\" noshade=\"noshade\"\/>\n<div class=\"fb-share-button\" data-href=\"https:\/\/on-line-interactivity.com\/\" data-layout=\"button\" data-size=\"large\"><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fon-line-interactivity.com%2F&amp;src=sdkpreparse\" class=\"fb-xfbml-parse-ignore\" rel=\"noopener noreferrer\">Share<\/a><\/div>\n<p>&#13;<\/p>\n<div id=\"fb-root\"\/>&#13;<br \/>\n<script async=\"\" defer=\"defer\" crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v4.0&amp;appId=103650273035821&amp;autoLogAppEvents=1\"\/><!-- End of FACEBOOK SHARE BUTTON CODE --><span class=\"style6\"><br \/><span class=\"style2\">\u00a92019 - All Rights Reserved by <a href=\"http:\/\/HelpMeFindFreedom.Online\">HelpMeFindFreedom.Online<\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/span><\/span><\/div>\n<p>&#13;<br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; \u00a0 &#13; \u00a0&#13; &#13; &#13; &#13; Article Navigation &#13; Back To &#13; Main Page &#13; &#13; &#13; \u00a0 &#13; Click Here &#13; for more articles &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; Identity Theft Article &#8211; A Phisher Is Trying To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6954","post","type-post","status-publish","format-standard","hentry","category-adsense-business-in-a-box"],"_links":{"self":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/comments?post=6954"}],"version-history":[{"count":0,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6954\/revisions"}],"wp:attachment":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/media?parent=6954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/categories?post=6954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/tags?post=6954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}