www.puzzlehacker.com

How to avoid phishing scams

Posted on: January 8, 2010

Now a days as more and more people report falling prey to phishing scams, Google blog has come up with some safety guidelines, which I would like to share with my readers.

What is phishing?

Someone poses as someone else in an effort to fool you into sharing personal or other sensitive information with them, this is a simple defenition of phishing.

Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from “your bank” can look very real; the bogus “login page” you’re redirected to can seem completely legitimate.

Guidelines to escape from Phishing attacks

1.Be careful about responding to emails that ask you for sensitive information like social security number, bank passwords,account numbers.Legitimate businesses will never ask for this information via email.

2.Go to the site yourself, rather than clicking on links in suspicious emails.Open a new browser window and go to the organization’s website as you normally would

3.Check for signs and verifications.If you’re on a site that’s asking for sensitive information,check the URL to make sure the page is actually part of the organization’s website, and not a fraudulent page on a different domain (such as mybankk.com or g00gle.com.)look for “https” at the beginning of the URL and the padlock icon in the browser. (In Firefox and Internet Explorer 6, the padlock appears in the bottom right-hand corner, while in Internet Explorer 7 the padlock appears on the right-hand side of the address bar.)

4.Avoid “fabulous offers” and “fantastic prizes” that you’ll sometimes come across on the web.

5.Use a browser that has a phishing filter. The latest versions of most browsers — including Firefox, Internet Explorer, and Opera — include phishing filters that can help you spot potential phishing attacks.

Advertisements
Tags:

1 Response to "How to avoid phishing scams"

Verity Technologies launches Online Access Security Solution – Blue ID 2
Blue ID: Addresses security and authentication concerns
India (Bangalore) Verity Technologies, a mobile applications company with focus on Authentication and Identity Management Services, today announced a launch of its pathbreaking Blue ID 2 technology. This new generation technology can secure financial transactions, manage access, control confidential data and generally eliminate phishing in this era of increasing online adoption.

Online Access Control
How does a portal / website secure online access for its registered users?
How does a portal / website eliminate the risk of phishing completely?
By integrating Blue ID 2
Blue ID 2 provides a portal a mechanism to allow the customers to use the Phone as an Authentication device. With the risk of phishing and identity theft removed, access is made safe, easy and a mass market phenomenon.

For editorial queries: Ramesh A, Verity Technologies Pvt. Ltd., Email: ramesh@veritytech.com, Phone: +91 80 25251500

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 92 other followers

Twitter

Error: Twitter did not respond. Please wait a few minutes and refresh this page.

Subscribe to RSS headline updates from:
Powered by FeedBurner

Software Blogs - BlogCatalog Blog Directory
%d bloggers like this: