"Pfishing", sometimes spelled "Phishing", is a word that's used to describe a method of identity theft where con men use fake e-mail that looks like it comes from legitimate sources. This e-mail is designed to hoodwink you into giving out personal and financial information. Once the scammers receive your information they use it to either clone your identity or to empty out your bank accounts and run up your charge cards. Here are some tips on how to avoid becoming the next victim.
1. Never respond to an e-mail that looks like it came from your bank or any of your credit card issuers no matter how official it appears. Phishing scam e-mails will tell you that there is some problem with your account and that you have to click on an embedded link to correct that problem. They may threaten to close your account, or report you to the credit bureau, if you do not respond. DON'T DO IT. Don't call the telephone number that appears in the email either. Get out one of your old bank or credit card statements and call the number that appears there. Explain what the email says and follow the directions that you receive from the actual employee. Chances are they'll tell you its a scam.
2. Never give your bank account information, credit card numbers, Social Security number, passwords, personal identification numbers (PIN), or Date of Birth to anyone who asks you for that information by email. No legitimate company will expect you to reveal sensitive information via email. Also, no company that issues you a PIN will ever ask you to reveal that PIN to any of their employees.
3. Never respond to any offer to buy anything by clicking on the link in the e-mail. Even if the e-mail looks like it comes from your favorite department store it might be a scam. To avoid being hooked by Pfishing, type in the URL to the department store by yourself. Go to Google.com to look it up if you don't already know it.
4. Forward copies of any Pfishing email to the actual company or bank that is being imitated by the scammers. You can usually send any email to postmaster@ and then the bank or company name.
5. If a Pfishing e-mail seems particularly threatening or worrisome to you, report it to the Internet Crime Complaint Center (www.ifccfbi.gov), a partnership between the FBI and the National White Collar Crime Center.
6. If it's too late and you already provided any of your personal information, account numbers, or PINs then you should immediately contact your banks and credit card companies to make arrangements with them to protect your financial interests. These companies and institutions are familiar with these scams and they know what needs to be done.
7. If you receive evidence of identity theft, such as unauthorized charges on your credit card bills, or unexplained transactions in your bank account, contact the police and file a report. Be sure to get a copy of the report for your own records and to send to the companies that are involved in the transactions. You also need to contact all three major credit bureaus (Equifax at 800-525-6285, Experian at 888-397-3742 and TransUnion at 800-680-7289) and tell them that you need a fraud alert placed on your credit file.
8. You can get information on ID theft and Pfishing at the Federal Trade Commission Web site at www.ftc.gov or calling toll-free 877-382-4357.
Copyright ? 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get resources, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-software.com/52ways.html
best cleaning company Highland Park ..This tutorial covers OLAP solutions used by Data warehouses and... Read More
Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More
Software Engineering is the Systematic Approach for analysis design implementation... Read More
I have recently created my first Php program. I wanted... Read More
Microsoft Great Plains fits to majority of horizontals and retail... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More
Your computer cost you from hundreds to thousands of dollars,... Read More
How would you like to prevent spyware and adware from... Read More
Writing software manuals is boring, isn't it? We often think:... Read More
Features Additionally, Vista will include many other new features.Aero Vista... Read More
Anti-virus software is used to find, remove or fix files... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
Microsoft Great Plains fits to majority of industries, in the... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
I like my software simple. If it's too complex or... Read More
The most important things you can do for your computer... Read More
This is a short article, written in question/answer/FAQ style to... Read More
What is Interactive Mapping?Interactive mapping is a visual display medium... Read More
I have always regretted how Microsoft price gouges and rips... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More
Now that spyware is the single most dangerous threat to... Read More
The adware and spyware definitions list is very long. But... Read More
It won't matter how effective your WinRunner Team is if... Read More
high-end home cleaning Winnetka ..The major reason I recommend getting your hands on real... Read More
Microsoft Outlook is one of the most widely used software... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More
Microsoft Business Solutions Great Plains is very generic accounting application... Read More
What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More
So let's begin crunching down these 300 images using Adobe... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
The cornerstone of successful automated office systems is the ability... Read More
In this article you will find some background information about... Read More
Rapid Application Development (RAD) is a software development methodology. In... Read More
Microsoft CRM customization techniques are very diversified and based on... Read More
TikiWiki is open source software - it is written in... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More
Now that spyware is the single most dangerous threat to... Read More
Enabling Chinese input is quick and easy, there are only... Read More
When Great Plains Software was designing and developing Great Plains... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
In our case ? we serve Microsoft Business Solutions ERP... Read More
The fact that a software tester is a most infamous... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Our opinion is based on our Microsoft Business Solutions Great... Read More
This article is the fourth of a series of articles... Read More
Microsoft Great Plains is now standard mid-market ERP application, serving... Read More
Software |