Download Fraud Eliminator to Protect Yourself from Phishing Scams
Gone Phishing Yes, that is the correct spelling for another form of computer crime. PRWEB Download this press release as an Adobe PDF document. Don't be a victim of the latest computer crimes that can rob your bank account and steal your identity, Warns Geeks In A Flash! a Wilmington, NC based computer company. Wilmington, NC (PRWEB) August 16, 2004 -- Although this type of computer crime has been happening for years, it appears to be picking up steam. Banks are not the only institutions being targeted. Just recently, AOL, Amazon, eBay, and many other large organizations have been hit. The criminals simply want any information that leads to your money, i.e., checking accounts, user names, passwords, bank routing numbers, and even social security numbers. If it leads to money or identities, it's a potential target. Banks and online companies are fighting back however, and very strongly. "Technology experts are working hard to combat this threat by putting in anti-theft tools for computer servers and key systems" says Manuel W. Lloyd, a technology expert that owns three technology businesses. One of his businesses focuses on helping individuals and small businesses fight such cyber crimes. "What needs to be done is quite simple, but can get costly if not done properly...” says Lloyd.”Most companies think that firewalls, spam filters, and Spyware tools will do the trick, when in fact, that's just the beginning". Lloyd continues, "Security must be indepth, not just a few buzz words that people hear and say, oh, we need that, let's get it. If individuals and companies want tighter security, discipline has to be a part of your anti-theft arsenal as well." Lloyd suggests doing your own research. "One good place to go is a website that is dedicated to just helping to fight Phishing and other cyber crimes. The Anti-Phishing Working Group (APWG) is an industry association focused on eliminating identity theft. Their website is www.antiphishing.org". Lloyd highly recommends going directly to their "Phishing Archive" at http://www.antiphishing.org/phishing_archive.html This lists all the recent and past Phishing scams. Mr. Lloyd does emphasize that "I do recommend getting all the tools such as a firewall, anti virus, anti spam, anti Spyware, and an anti key logger tools as a base defense, but nothing beats good old fashion street smarts". Geeks In A Flash! www.geeksinaflash.com, one of Lloyd's companies, provides all these tools free of charge in an effort to help innocent victims of these cyber crimes. They only charge a nominal fee if you need their assistance to install and configure the programs more in depth. Another of Lloyd's companies, www.mwlconsulting.com, which carries Mr. Lloyd's name, helps organizations implement strategies to prevent their customers from becoming victims. "This company is a strategic partner to many companies, including national franchises" says Lloyd. "We work with restaurants, national pizza delivery companies, financial institutions, and pharmaceutical type organizations which all have an online presence or will have one within the next year". Mr. Lloyd predicts that these types of crimes will only get worse as cyber criminals are harder to track, but insists that you, your company, nor the world have to be a victim. By putting the right tools, resources, and good old fashion street smarts into play, the world can win the cyber crime battle. Terminology Email Spoofing - Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. The main protocol that is used when sending e-mail -- SMTP -- does not include a way to authenticate. There is an SMTP service extension (RFC 2554) that allows an SMTP client to negotiate a security level with a mail server. But if this precaution is not taken anyone with the know-how can connect to the server and use it to send spoofed messages by altering the header information. In some jurisdictions, e-mail spoofing anyone other than yourself is illegal. - Source www.webopedia.com Domain masking - Simply put, masking hides the real name of a domain as to appear as something else. This is not criminal, but as with many non-crimninal things, it can be misused by those seeking to do harm to others. Anti virus software - Software that protects your computer from getting viruses. - Source www.geeksinaflash.com Anti spam software - Spam is "Junk email". Anti spam software tries to eliminate spam. According to some reports, spam represents 90% or better of all email. – Source www.geeksinaflash.com Anti Spyware software - Spyware or Ad aware programs track the websites you go to and build a pattern of what you do so that certain marketers can sell their products to you using your e-mail or with annoying popup ads. Geeks In A Flash! www.geeksinaflash.com provides a free package of all these tools and only charges for installation and configuration if you need the help. If you need help installing and configuring these tools, you can reach them toll free at 888.211.1623. Otherwise, you can request the free tools by e-mailing them at e-mail protected from spam bots. They also provide free membership to those looking for ongoing support. Go to www.geeksinaflash.com and create a user profile and follow the instructions. About Geeks In A Flash! |
Netflix Fixes "Phishing" Security Threat Loose Wire: Phishing Pushes Banking To Impose Transfer Limits "Extension to IODEF-Document Class for Phishing, Fraud, and Other Non-Network Layer Reports", Patrick Cain, David Jevans Know your Enemy: Phishing Phishing Netcraft: 5,600 Phishing Sites Since December Strange "Barclays" Phishing Attempt Anti-Phishing Working Group Creates Phishing Scam Database for Members (2 June 2005) Reformed UK fraud law to tackle phishing attacks "Extension to IODEF-Document Class for Phishing, Fraud, and Other Non-Network Layer Reports", Patrick Cain, David Jevans |