Anonymous

Difference between revisions of "Online and Computer Scams"

From Clicklaw Wikibooks
Line 10: Line 10:
==Phishing and Smishing==
==Phishing and Smishing==
These scams are forms of [[Identity Theft|identity theft]]. They are tactics to get you to reveal your personal and financial information.  
These scams are forms of [[Identity Theft|identity theft]]. They are tactics to get you to reveal your personal and financial information.  
'''"Phishing"''' involves scammers creating email messages and web pages that mimic those of a bank, credit card company, auction site or escrow service such as PayPal. The imitations can sometimes be very good.


The scammers send emails randomly to “fish” for passwords and financial data, hence the term “phishing” (pronounced “fishing”). These emails often ask you to “re-register” or “reactivate” an <span class="noglossary">account</span>. They provide a link to a website that appears to be the legitimate site of the company or financial institution.  
''Phishing'' involves scammers creating email messages and web pages that mimic those of a bank, credit card company, auction site or escrow service such as PayPal. The imitations can sometimes be very good. The scammers send emails randomly to “fish” for passwords and financial data, hence the term “phishing” (pronounced “fishing”). These emails often ask you to “re-register” or “reactivate” an <span class="noglossary">account</span>. They provide a link to a website that appears to be the legitimate site of the company or financial institution.  


The goal is to trick you into providing personal, financial, or password data. Once the scammers have your information such as credit card numbers, bank <span class="noglossary">account</span> information, social insurance numbers, and passwords, they use it to commit more fraud.
The goal is to trick you into providing personal, financial, or password data. Once the scammers have your information such as credit card numbers, bank <span class="noglossary">account</span> information, social insurance numbers, and passwords, they use it to commit more fraud.
9,075

edits