Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 12 March 2013

Protecting Yourself Against Online Identity Thieves

Posted on 05:29 by Unknown
Identity thieves, send out thousands of fake emails daily, claiming that they are representing certain official entities. So take care if you receive emails saying they are from some government agency or department, as it may be that these emails are part of phishing schemes.

Phishing typically is when someone sends you emails with "bad" links in them. When you click on these links you get redirected to a "fake" site which is an exact mirror of the official site. Here you are then prompted to submit some confidential information. This information that you provide is then used to log into your real account leaving you totally clueless as to what happened. You should be aware that companies rarely communicate via email if it is in relation with sensitive account information. If they do, it is typically in response to an email that you have sent them.


OK, so what exactly can I do to protect myself against identity thieves on the web?
  1. Simple, just do not be gullible. These guys strike when you least expect it, so always be on the lookout for suspicious looking emails.
  2. If you receive a suspicious mail, don't fill out any forms requesting sensitive personal information. In fact, do not do anything. Verify whether the email is legitimate or not. Nowadays, most agencies or companies are listed on the web. Their contact information readily is available. With this information at hand you can verify whether or not any communications you received are legitimate.
  3. Don't click on or save attachments that come with suspicious emails. Delete these files immediately. Alternatively, if you have a good anti-virus, scan the attachments first before opening.
  4. Update regularly. Windows posts updates almost daily, especially security patches. Make sure you have your settings set that you can download these automatically. I know it's a pain and eats away at your bandwidth and RAM. But I like to think that it's better to be safe than sorry!
  5. Even though you should never take action on suspicious sites or emails, be sure to watch out that the address bar starts with "HTTPS". This means that the page is encrypted and should be secure. If there is no "HTTPS" then leave at once.
Unfortunately no Anti-virus software can protect you against phishing schemes.

In conclusion, if you keep these tips in mind when receiving strange suspicious emails you should be fine. And remember to always be awary of phishing schemes.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Online Tips, Security Tips, tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Spider Silk: The Super Material of the Future
    Today's scientists and researchers are more advanced than they have ever been before thanks to the use of highly effective traditional ...
  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Windows 8: How To Eliminate Shut Down Problem
               Windows 8 latest operating system launched by Microsoft known for its Modern UEFI interface, windows defender with antivirus prog...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ▼  March (31)
      • How To Get Free Mobile Recharge/Airtime
      • How To Boot Ubuntu From A USB Flash Drive
      • Secret Codes For Your Android Mobile
      • What are Cloud Services?
      • Forget Your Windows 7 Password? Create Windows 7 P...
      • How To Create Bootable Windows 8 Usb Drive
      • Flipped Text Generator ʎuunɟ
      • Facebook Chat Letters Generator
      • Now You Can Watch TV, Anytime...Anywhere!
      • 4 Best Apps For Learning On The Go
      • Challenge: Can You Install New Theme In Your WP Si...
      • Google Apps for Businesses
      • How To Make A Folder Invisible?
      • Ways to Prevent Computer Viruses
      • Beaware Of Viruses On Social Networking Sites!
      • 10 Best Educational Apps Of 2013
      • Keeping Personal Data Safe: Mistakes You Should Avoid
      • Android Apps You Can't Miss This Year
      • Protecting Yourself Against Online Identity Thieves
      • How To Choose A Best 2.1 Speaker System
      • 15 Useful Google Tricks
      • What To Look For When Buying A New Android Tablet?
      • Why Is Blu Ray Better Than Standard DVD?
      • What Is Buffering And It's Facts
      • Different Types of Malware
      • How To Move Your Blogspot Blog To Your Own Domain
      • How Firewall Work's
      • Free Software To Split And Merge Large Files [Free...
      • Using Google Webmaster Tools
      • Find the Speed Of Your Hard Disk, Pendrive, etc.. ...
      • Special Features Of Employee Monitoring Software I...
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile