logo
g Text Version
Beauty & Self
Books & Music
Career
Computers
Education
Family
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
Money
News & Politics
Relationships
Religion & Spirituality
Sports
Travel & Culture
TV & Movies

dailyclick
Bored? Games!
Nutrition
Postcards
Take a Quiz
Rate My Photo

new
Painting
Heart Disease
Horror Literature
Dating
Hiking & Backpacking
SF/Fantasy Books
Healthy Foods


dailyclick
All times in EST

Full Schedule
g
g Crime Site

BellaOnline's Crime Editor

g

Phishing Emails - What are They?


Fraudulent emails are a concern of anyone who has an email account. Scammers use these emails to attempt to obtain personal information such as Social Security, credit card or bank account numbers from their targets. If you hand over the information, you are subject to not only misuse of any current financial accounts you have, but also possible opening of new accounts in your name by the scammer.

Email scammers, also known as “phishers” because they “fish” for information in their emails, may obtain your email address in a number of ways. They may frequent message boards looking for people who have left their emails for contact by other members, from simply guessing and sending emails to random addresses or by compromising (“hacking”) email lists of companies.

Some Internet users try to take steps to stop phishing emails before they ever get them. They may choose to never leave their email address on open forums, or to spell the address out if they do. Spelling out your email address means writing it completely out in words, as in “Name at ISPname dot com” rather than “Name@ISPname.com“. However, this does not actually work, as phishers are well aware of this trick and can program their harvesting software to look for email addresses formatted in this fashion.

Phishers who randomly guess at email addresses will nearly always be able to contact you. Choosing an email address with an odd mixture of characters may lessen your likelihood of receiving scam emails in this fashion. But you may also make your email address more difficult for personal or business contacts to remember or type correctly, which may make you miss receiving important messages.

Hackers are another threat that can lead to phishing emails, and can be one that is totally out of your control. One of the biggest breaches of email list security came in March 2011, when Epsilon’s data was compromised. Epsilon handles email lists for 2500 major companies, including Kroger, Home Shopping Network and Walgreen’s. These companies immediately sent out emails advising customers of the breach and assuring them that only their names and email addresses were accessed-no other personal data was breached. I have done business with some of these companies myself and received one email from each of them.

You may rely on your ISP’s spam filters to catch phishing attempts, but invariably at least some of these fraudulent emails will get through. Therefore, the primary emphasis should be not on avoiding phishing emails, but rather on how to recognize and handle them when they appear in your inbox.

Click the links below for parts two and three of this series!

Add Phishing+Emails+%2D+What+are+They%3F to Twitter Add Phishing+Emails+%2D+What+are+They%3F to Facebook Add Phishing+Emails+%2D+What+are+They%3F to MySpace Add Phishing+Emails+%2D+What+are+They%3F to Del.icio.us Digg Phishing+Emails+%2D+What+are+They%3F Add Phishing+Emails+%2D+What+are+They%3F to Yahoo My Web Add Phishing+Emails+%2D+What+are+They%3F to Google Bookmarks Add Phishing+Emails+%2D+What+are+They%3F to Stumbleupon Add Phishing+Emails+%2D+What+are+They%3F to Reddit



 



How to Spot Phishing Scam Emails
How to Handle Phishing Email Scams
RSS
Related Articles
Editor's Picks Articles
Top Ten Articles
Previous Features
Site Map




For FREE email updates, subscribe to the Crime Newsletter


Past Issues


print
Printer Friendly
bookmark
Bookmark
tell friend
Tell a Friend
forum
Forum
email
Email Editor


Content copyright © 2013 by Donna Johnson. All rights reserved.
This content was written by Donna Johnson. If you wish to use this content in any manner, you need written permission. Contact Donna Johnson for details.

g


g features
Famous Crime Deaths 2013 January - June

Aileen Wuornos - Trial and Aftermath

The Chowchilla Kidnapping - Arrest and Aftermath

Archives | Site Map

forum
Forum
email
Contact

Past Issues
memberscenter


vote
Poetry
Daily
Weekly
Monthly
Less than Monthly



BellaOnline on Facebook
g


| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2013 Minerva WebWorks LLC. All rights reserved.


BellaOnline Editor