The following should drive home exactly where you stand to benefit from the IT services NYC company E-Valve Technologies can offer you. For the uninitiated, a phishing scam has nothing to do with good vibrations and music festivals. That’s the band Phish and they’re cool. Phishing on the other hand. Not cool. A phishing scam is most commonly associated with malicious and manipulative emails sent by hackers and criminals posing as friends, family, banks, etc. in pursuit of stealing personal information or convincing you to inadvertently launder dirty money. They can be remarkably convincing, as they’re designed to inspire panic or excitement that will then translate into irresponsible action.
Sometimes they’ll say that they’re your bank and that your information is already at risk, and that if you don’t respond immediately that your passwords and credit card info will be compromised. Another is to say that a family member is in trouble and that you need to wire a large quantity of money to an account immediately in order to help this person. One of the most common is to say that you have been selected as the winner of a contest for large quantities of money, and that you simply have to allow them to send you the money.
If any of these have happened to you and you responded, unfortunately, you have most likely been the victim of a scam and you should make sure that nothing has been taken from you. But in addition to checking up on everything, you could also benefit from a bit of education so as to become more equipped to spot a scam in the future. So in the interest of becoming a more informed Internet user, here is the step by step explanation of what goes into phishing scam.
Planning: The guilty party will typically do a fair share of research before making an attack. They’ll usually seek out large businesses from which they will find someone to gain access to gigantic email lists. The larger the email list the better, as this means more potential for someone to fall for the trick. They’ll then mimic the same mass email marketing technique used by spammers selling shoddy herbal products, etc.
Setup: Now that they know their targets, they get to work on building a website that looks authentic and appealing to this particular audience. If they have your email address, they can probably learn a whole lot more about you, your friends, your interests and your friends’ interests. They use all that information to shape a convincing website that serves an agenda to which you are likely to respond.
Attack: Once all the settings, emails, and faux websites are in order, that’s when they pounce. That’s where you, the unsuspecting victim, enter into the equation. You receive a message from a source that resembles a reputable company with an logo that seems almost identical to the authentic original one. At first glance, no one would notice the difference. They’ll usually mimic larger companies like Amazon, E-Bay, or something similar. Sometimes they will open by simply asking you to fill out some information as opposed to asking you for money. Whatever info you plug into a pop up or web page will eventually be used against you.
Identity Theft: And then finally, it happens. Money disappears, as the phishers make illegal purchases using your credit card. Nearly a quarter of those who fall victim to these scams never recover everything they’d lost.
This can all be prevented with a bit of attention to detail and more importantly, with reliable IT services. NYC tech support company E-Valve Technologies has got you covered. Give us a call today at 646-564-3636.
Get The Latest IT News Sent Directly to Your Inbox.
Sign up for industry news, information about our services, events, webinars and more.