Tips On How To Recognize “Scams” And “Fraudulent” E-mail


I wanted to share some tips on how you can protect yourself . Below are some great tips and resources I have recommended to my clients during my self defense classes.

Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, Windows Live IDs, other account data and passwords, or other information.

You might see a phishing scam:

In e-mail messages, even if they appear to be from a coworker or someone you know.
On your social networking Web site.
On a fake Web site that accepts donations for charity.
On Web sites that spoof your familiar sites using slightly different Web addresses, hoping you won’t notice.
In your instant message program.
On your cell phone or other mobile device.

Often phishing scams rely on placing links in e-mail messages, on Web sites, or in instant messages that seem to come from a service that you trust, like your bank, credit card company, or social networking site.

Your first level of defense against phishing scams and other malicious humans or software is to secure your computer.

Some phishing e-mail contains malicious or unwanted software that can track your activities or simply slow your computer. Try new antivirus and comprehensive computer health services such as Windows Live OneCare. To help prevent spyware or other unwanted software, use Windows Defender. Windows Defender comes with Windows Vista and is available at no charge for Windows XP SP2. –Protect your computer in 4 steps.-

For the full article go to Recognize phishing scams and fraudulent e-mail

More Useful Info to help you

EBay Bad Actors – Beware of Scams and PhishingHow-To & Education SquidooSquidoo

No password jam and phishing scams allowed here!Computers, Gadgets & Tech SquidooSquidoo

How to Recognize a Phishing Scam | eHow.com

Get help with your phishing and fraud questionsMicrosoft Corporation

“Prosper Learning” Newsletters:Prosper Inc.

For more see Devin Willis and Defensive Tactics

Consumer Reports Website Product reviews and Ratings on cars, appliances, electronics and more from Consumer Reports.

Advertisements

4 Comments

Filed under devin willis + prosper, How to Recognize a Phishing Scam, tips

4 responses to “Tips On How To Recognize “Scams” And “Fraudulent” E-mail

  1. A few good places to check to avoid being scammed are:

    How to avoid being scammed »» Read more Scam Fighting Tips in this Forum
    http://www.antiscam.org/information.shtml

  2. Steven Gross

    Dev, great info. Michelle’s personal cell phone receives some spam texted to her. It’s from someone we don’t know and asks us to provide some personal info. We need to look into this more. What a great heads up!!

    Thanks

  3. David Keller

    Devin,
    It seams that some of the information is cut off, but what is there is very informative. Any tips on whether or not to open those emails? Or is this problem only associated with responding?

    ————————————————————————————————–

    David-I wanted to thank you for your points!

    Here are some practical tips to help you decide whether or not to open an attachment:

    + If you get an email with an attachment from someone you don’t know, delete it. You don’t take candy from strangers, and you should behave the same with email attachments.

    + If you get an email with an attachment from a friend, don’t assume it’s harmless! Many viruses spread by automatically sending themselves to the addresses found in the victim’s address book, and they often include something in the message body that looks like a personal message from your friend.

    + Unless you are very computer savvy, and you can tell for sure from the name of the attached file that it’s not a virus, then CALL or EMAIL your friend and ask if they meant to send you an attachment.

    Take care,
    Devin


    Resource

    Anti Virus 101 – Computer Virus Software and Protection

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s