Welcome to YLOAN.COM
yloan.com » Hardware » How To Protect You And Your Family From Phishing by:Nick Messe
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

How To Protect You And Your Family From Phishing by:Nick Messe

People everywhere have started to make themselves aware of one of the newest threats on the internet

. If you have a personal computer and any members of your family are on the internet, it is something that you will want to be familiar with, too. The new practice is called phishing but is pronounced fishing. That comparison is also appropriate to make regarding the practice.

Basically, what a hacker will do if he is phishing on your computer is he will somehow break into your computer's console to have the ability to takes snapshots of your activity. This means that if your computer has been phished, they will be able to take and save snapshots of purchases you make, mortgages you are applying for, different types of auto loans and title loans. Once they have your social security number, checking account number, credit card number or worse, they will then take action.

There are a few different ways that these criminals can strike once they have your information. Either they can falsely use your checking account to make large purchases or run your credit card up in the same way. If they are more serious criminals, they might go so far as to steal your identity completely. If they do this, they might take out mortgages, auto loans or title loans out in your name and not pay on them.

The worst part about this experience would be the fact that when you finally do find out what's happened, it's often too late. Once credit history has been damaged, it is very difficult to repair. However, now that you are an informed consumer, you can avoid certain situations that can open your computer up to unwanted phishing. For instance, never open emails that are from an unknown recipient.


If by accident you do open one of the dreaded emails up, make sure you never click on any links, no matter how interesting they might sound. It is important to remember that often, these emails could come from companies you trust or other emails that have been phished already. Just remember that if you cousin starts sending you links about the Acai Berry Diet, it is probably not reputable. Other hackers might use credible names like federal financial institution or your bank name.


You should also make sure your entire family knows not to click on ads when surfing the web, no matter how interesting they are made to sound. Another phishing tactic is asking you to change your account or login information. Remember that most banks and other credible institutions will never send you an email asking you to do this. Therefore, if you get a request that seems a little suspicious, your best bet is to call first to find out whether or not the request is credible.

If it's not, your bank or financial institution might ask you to forward them the email so that they are able to press charges on the creator. Chances are, if the institution deals at all with mortgages, auto loans or title loans, they've seen this threat before. No matter what, make sure you surf safely on the internet at all times. The identity you save may be your own.

About the author

The Illinois Community Credit Union exists for its members. For Sycamore and DeKalb car loans and mortgages visit http://www.IlComCu.org - We exist to give our members lowers fees and better services.
Your Best Tool For Protecting Your Netbook Is A Netbook Sleeve by:Jeff Schuman UAE Telecom Industry to Amplify in Forthcoming Years by:Shushmul Maheshwari Where to Buy Printer Ink Cartridges by:Kathryn Dawson Computer Laptop Sleeves - Protect And Show How Unique You Are by:Jeff Schuman Clear Laptop Sleeve - Benefits For Everyone by:Jeff Schuman Save Money on Your Printer Cartridges by:Kathryn Dawson Why Should You Choose A Cool Laptop Sleeve? by:Jeff Schuman Reverse Email Search Investigations Are the Most Effective Way to Halt a Stalker's Activities by:Ed Opperman Put an End to Cyber Stalker's Inappropriate Behavior With a Reverse Email Search by:Ed Opperman Post Your Resume Online - Top 10 Tips for Posting a Resume by:Silas Reed Post Resumes - How to Know Where to Post Your Resume by:Silas Reed Resume Posting Sites - Top 10 Resume Posting Websites by:Silas Reed Resume Blasting - Myths about Resume Blasting by:Silas Reed
print
www.yloan.com guest:  register | login | search IP(3.145.10.222) / Processed in 0.026952 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 16 , 3396, 44,
How To Protect You And Your Family From Phishing by:Nick Messe