“Spoofing” or “phishing” scams attempt to make internet users believe that they are receiving e-mails and texts from a specific, trusted source. Spoofing is often used to convince individuals to divulge their personal or financial information. This then enables the perpetrators to commit credit card fraud, bank fraud, and other forms of identity theft. In “email spoofing” the header of an e-mail appears to originate from someone or somewhere other than the actual source. Spam distributors often use email spoofing to get their recipients to open the message and possibly even respond to their solicitations.
“IP spoofing” is a technique used to gain unauthorized access to computers. In this instance the unscrupulous scammer sends a message to a computer with an IP address indicating that the message is coming from a trusted source.
“Link alteration” involves the altering of a return internet address of a web page that is emailed to a consumer in order to redirect the recipient to a hacker’s site rather than the legitimate site. Often, they link to what appears to be a genuine website when this is not the case at all.
For example, the subject may say that the email has been sent from a person working at the bank you use. Perhaps it will even say that it is an urgent message. It will then usually have a link to a website that asks you to enter in your personal information, and sometimes these can look very convincing. This is accomplished by adding the hacker’s IP address before the actual address in an e-mail which has a request going back to the original site.
If an individual unsuspectingly receives a spoofed e-mail and proceeds to “click here to update” account information, for example, and is redirected to a site that looks exactly like a commercial site such as eBay or PayPal, or even a bank, there is a good chance that the individual will follow through in submitting personal and/or credit information. And that is exactly what the hacker is counting on.
- If you need to update your information online, use the same procedure you’ve used before, or open a new browser window and type in the website address of the legitimate company’s page.
- If a website’s address is unfamiliar, it’s probably not authentic. Only use the address that you’ve used before, or better yet, start at the normal homepage.
- Most companies require you to log in to a secure site. Look for the lock in your browser and “https” in front of the website address.
- If you encounter an unsolicited e-mail that requests, either directly or through a web site, for personal financial or identity information, such as Social Security number, passwords, or other identifiers, exercise extreme caution.
- Take note of the header address on the web site. Most legitimate sites will have a relatively short internet address that usually depicts the business name followed by “.com,” or possibly “.org.” Spoof sites are more likely to have an excessively long string of characters in the header, with the legitimate business name somewhere in the string, or possibly not at all.
- If you have any doubts about an e-mail or website, contact the legitimate company directly. Make a copy of the questionable web site’s URL address, send it to the legitimate business and ask if the request is authentic.
- Always report fraudulent or suspicious e-mails to your ISP (internet service provider), and also to the company they may be pretending to be.
- Lastly, if you have been a victim of an online scam, you should file a complaint with the your local authority.
The information provided on this website does not constitute investment advice, financial advice, trading advice, or any other sort of advice and you should not treat any of the website’s content as such. Won Connect CIC does not recommend that any cryptocurrency should be bought, sold, or held by you. Do conduct your own due diligence and consult your financial advisor before making any investment decisions.
Visit our smart gagdets store, for the latest models and great deals on Smart home.
We also offer a huge selection of professional, fun and technical eBooks and wide range of academic and scholarly titles. Please visit our stores to find out more
Whether you’re looking for a smartwatches, smart home devices security, light bulb, security camera, or thermostat, start with the best smart home devices here