{"id":57,"date":"2012-01-10T10:39:24","date_gmt":"2012-01-10T15:39:24","guid":{"rendered":"http:\/\/blog.computerworksmi.com\/?p=57"},"modified":"2011-12-27T13:43:33","modified_gmt":"2011-12-27T18:43:33","slug":"phishing","status":"publish","type":"post","link":"https:\/\/blog.computerworksmi.com\/?p=57","title":{"rendered":"Phishing"},"content":{"rendered":"<p><strong>What Is Phishing?<\/strong><\/p>\n<p>Phishing (pronounced like fishing) is what online criminals do to try to trick you into giving them sensitive information to access your online banking or other financial website accounts.<\/p>\n<p>They walk the walk and talk the talk to try to convince you that they are an actual, legitimate person trying to help you. They can try to look like your financial institution, a social network like Facebook or Twitter, or even Google or Microsoft.<strong> <\/strong><\/p>\n<p><strong>What Do Phishing Websites Commonly Ask for?<\/strong><\/p>\n<p>It\u2019s good to get into the habit of looking before you sign in on log-in screens online. Be wary of any message that asks for personal information or links to other websites that ask for personal information.<\/p>\n<p>Commonly, phishing websites will as for at least two of the following items:<\/p>\n<ul>\n<li>User names and passwords<\/li>\n<li>Social Security numbers<\/li>\n<li>Bank account numbers<\/li>\n<li>Personal Identification Numbers (PIN)<\/li>\n<li>Full credit card numbers, including expiration date and security code<\/li>\n<li>Your mother\u2019s maiden name (Commonly used to reset passwords)<\/li>\n<li>Your birthday (Commonly used to reset passwords)<\/li>\n<\/ul>\n<p><strong>What Are Search Engines Doing to Protect Me from Phishing?<\/strong><\/p>\n<p>Google and other search providers scans for phishing websites at least 3 million times every day. They remove those fake internet sites and scams from showing up in your search results.<\/p>\n<p><strong>How Can I Protect Myself from Phishing?<\/strong><\/p>\n<ul>\n<li>Never reply to suspicious emails, tweets, posts to your Facebook feed, direct messages, or other similar items. These may be linked to even more malicious websites that will also infect your computer. If a link you clicked on takes you to a log-in screen, think twice about putting your information in there.<\/li>\n<li>Never enter your password into a website after following a suspicious link. If you are unsure if the link you followed is good or not, go to the actual website you were trying to log into from your bookmark or by typing the website name into the address bar.<\/li>\n<li>Never email your password or banking information to anyone, even yourself.<\/li>\n<li>Only enter your account information if you are 110% certain you are on the real website. To be 110% certain, you can check the address at the top of your web browser. Fake website addresses can look a lot like real website addresses. Take, for example, this fake address: www.goog.le.com. Do you see the extra period in the address? That\u2019s how you know it\u2019s not real.<\/li>\n<li>Make sure you install web browser updates as soon as possible. These updates allow your browser to warn you if you go to a website that is suspected of phishing. Google\u2019s Safe Browsing API is used by Firefox, Safari and Chrome to help protect you from those pages.<\/li>\n<li>Many email providers allow you to report suspicious email and phishing scams. Reporting those messages can prevent the individual from sending you further emails, and it also helps the email provider write better coding to stop similar messages from getting through to your email in the first place.<\/li>\n<\/ul>\n<p>&#8212;&#8211;<\/p>\n<p><strong>Have you ever been caught in a phishing scam? What did you do to protect yourself in the future?<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Is Phishing? Phishing (pronounced like fishing) is what online criminals do to try to trick you into giving them sensitive information to access your online banking or other financial website accounts. They walk the walk and talk the talk &hellip; <a href=\"https:\/\/blog.computerworksmi.com\/?p=57\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[8,5,12,9,11],"class_list":["post-57","post","type-post","status-publish","format-standard","hentry","category-onlinesafety","tag-emailsafety","tag-kidsandcomputers","tag-socialnetworkingsafety","tag-virusesmalwarespyware","tag-whatdoesthatmean"],"_links":{"self":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57"}],"version-history":[{"count":2,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions"}],"predecessor-version":[{"id":61,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions\/61"}],"wp:attachment":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}