1. Technology

Articles related to phishing

What Phishing and Email Scams Look Like - About Internet for ...
Have you wondered if an email is legitimate? Is that login screen for real? Sadly, these are often scams and "phishing" cons that lure you into divulging your ...
Phishing Attacks: What Is an 'Email Spoof'?
In many cases, the spoofed email is part of a phishing (con man) attack. In other cases, a spoofed email is used to dishonestly market an online service or sell ...
Internet/Email Scams: Phishing Emails & Phony Web Pages
This is the most widespread Internet and email scam today. It is the modern day " sting" con game. "Phishing" is where digital thieves lure you into divulging your ...
Phishing scams - Antivirus Software - About.com
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.
Protect Yourself From Phishing Scams - Internet / Network Security
Phishing attacks have become more sophisticated and users need simple steps they can use to protect themselves from becoming victims of phishing scams.
Spear Phishing: Identity Theft's New Black - About.com
Phishing is already a mainstay in identity theft attacks, but now a new method of attack is emerging. Spear phishing targets individuals and can be far more ...
How to Detect and Prevent Phishing Scams - Banking / Loans
Overview of Phishing Scams. Phishing scams are just another attempt to get valuable information. Scammers send a mass email to every address they can find.
Phishing - What is Phishing? - About Web Search
Phishing is unfortunately very prevalent on the Web. Learn more about phishing and how you can avoid it at the About.com glossary of Web search terms.
Phishing - Email Glossary Definition - About Email
Typically, phishing (from "password fishing") scams involve an email alerting the user to a problem with their bank or some web site account. The user is led to a ...
Recognize Identity Theft Scams - Spotting a Phishing Email
It's estimated that 75-100 million phishing emails are sent out each day. These emails are designed to capture your personal and financial information so that ...
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2014 About.com. All rights reserved.