Monday, August 15, 2011

Beware of Emails Bringing False Gifts by Miss Know It All


Recently I received the following email: Unusual Transaction Activity. “During a review of your account, unusual transaction activity was identified. For your protection, (the name of the bank has been left out to protect the innocent) has taken the precaution of suspended access to your account. Because attempts to contact you by phone have been unsuccessful, we urge you to contact our Customer Service department immediately.”

If this were not so serious, I would be laughing all the way to the bank, because I do not have an account at the bank that was mentioned; if I did, I would have immediately send this notice to the trash bin.

An email like this is a common everyday occurrence. This type of activity is known as phishing, which is a method of trying to obtain sensitive information such as your username, password, pin number and credit card information by camouflaging as a truthful institution, such as a bank or an online payment system. If you respond to this type of notice, you can end up losing the shirt off your back.

The FTC suggests these tips to help you avoid being hooked by a phishing scam:

  • If you get an email or pop-up message that asks for personal or financial information, do not reply. In addition, do not click on the link in the message, either. Legitimate companies do not ask for this information via email. If you are concerned about your account, contact the organization mentioned in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address yourself. In any case, don’t cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site.
  • Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a “refund.” Because they use Voice Over Internet Protocol technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization, you do business with, call the number on your financial statements or on the back of your credit card. In any case, delete random emails that ask you to confirm or divulge your financial information.
  • Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.
  • Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for antivirus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.
  • A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It is especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software “patches” to close holes in the system that hackers or phishers could exploit.
  • Do not email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins “https:” (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer’s security.
  • Forward spam that is phishing for information to spam@uce.gov and to the company, bank, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems.
  • If you believe you have been scammed, file your complaint here, and then visit the FTC’s Identity Theft website at www.consumer.gov/idtheft. Victims of phishing can become victims of identity theft. While you cannot entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk. If an identity thief is opening credit accounts in your name, these new accounts are likely to show up on your credit report. You may catch an incident early if you order a free copy of your credit report periodically from any of the three major credit bureaus. See http://www.annualcreditreport.com/ for details on ordering a free annual credit report.
Post a Comment