Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 16 August 2013

Most People Can't Identify Phishing Scams

Posted on 03:36 by Unknown

identify phishing scam
Most people can't identify phishing scams
One of the reasons that phishing scams are successful is that although most people believe that they know how to identify these attacks, they often still don't recognize suspicious emails. According to the Sydney Morning Herald, new research from North Carolina State University seems to indicate that Internet users are over-confident in their ability to recognize a phishing scam.

The study, which looked at a group of 53 undergraduate students, found that although 89 percent of participants were confident that they could recognize a scam in their inbox, only 7.5 percent actually identified the phishing emails. In addition, more than 50 percent of students deleted an email that was actually genuine.

Phys.org recently reported that phishing scams are becoming more sophisticated, fooling even the most tech-savvy Internet natives. When the Associated Press had its Twitter account hacked in April, it was due to a complex phishing attack directed at one of the news source's staffers. The staff member received an email that appeared to be from a colleague, but the link contained in the message actually led the employee to a "keylogger" that tracked keystrokes and recorded the organization's Twitter password.

The Sydney Morning Herald reported that this increased personalization of phony messages will only make it harder to identify scams. Phishers often pose as banks, government agencies or well-known retailers convince users to open the email and click on a link that either introduces a virus or leads to a fake website that is disguised as a legitimate source. That's why a password manager such as Sticky Password, which includes automatic form filling, can be so helpful - it won't supply your personal information to a deceptive landing page that isn't actually associated with the website you think you're using.



Example of a Phishing Scam:

Below is a Phishing Scam email that i received to my mail id in the name of giving "Financial Loan". Check it out,

Attn Everyone:
I got your details after an extensive online search. I am Mr RichardMoore of the Standford Financial Loan Firm has opened an opportunity toevery one in need of any financial help for Debt consolidation,personalloan,business loan etc, I give out loan to serious minded individuals. Myrates are very cheap and affordable. We also operate under short and longterm loans at 3%. I am God fearing and I have respect for my fellowhumans. Get to me today for that loan that you have always needed and getthe loan now.
Please note that this offer is opened to every serious mindedindividuals, firms and companies who wishes to obtain a loan to solvetheir financial problems like establishing new business, re-establishingold ones or pay debt etc. From this firm we operate on a 24hours serviceand we give our customers the best service because that is all we know howto do best.
We offer the following loans category;
* Personal Loan* Business Loan* Debt Consolidation Loan, etc
Minimum of $3,000.00 and a maximum of $90,000,000.00
Fill below if you are interested in our offer;
(1) Full Names:
(2) Contact/Mailing Address:
(3) State/Country:
(4) Amount needed as loan
(5) Loan duration:
(6) Occupation:
(7) Cell-Phone number:
(8) Monthly Income:
(9) Age:
(10)Sex
Contact our loan officer Mr Richard Moore inquiries;Email : sfinancials@kimo.com
Thanks,Richard MooreCEO
Another popular example of Phishing Scam mail is "Winning a Lottery". When you get a mail like this asking you personal details, Don't even think of replying them. Or else will be a victim of a Serious Scam! Just delete those mail.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ▼  August (26)
      • How Much Is A Site Worth?
      • Top 3 Android Battery Saver Apps
      • Learn How To Create YouTube Videos With These Thre...
      • 7 Steps to Clean Up PC Quick and Easy
      • 6 Types Of Photo Stitching Software Available In T...
      • How Gaming Consoles Have Changed Over Time
      • The Top 7 Proxy Services For Gaming
      • Tips To Choose Spy App For Mobile Phone Tracking
      • The Internet Of Things: The Future Has Arrived
      • 10 Of The Best Ways To Connect With People In The ...
      • Starting Your Facebook Page
      • Infographic On Education
      • Most People Can't Identify Phishing Scams
      • Tips on On-Page Optimization For Your Website/Blog
      • How to Be a Geek and Stay Healthy
      • Tips On How To Make Your Online Business Succeed
      • Why Your Business May Benefit From a Business App
      • Why Cloud Computing Is The Future Of The Modern Bu...
      • Why Technology Niche Is The Best For Blogging?
      • MalwareBytes: It's Free, But Is It Any Good?
      • The Changing Face of Blogging
      • The Rise Of The Mobile App
      • 5 Reasons To Use A Website Builder
      • How to Save a Wet Cell Phone?
      • Tips For Protecting Your Online Intellectual Property
      • A Week's Worth of Motivational Quotes
    • ►  July (25)
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ►  March (31)
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile