Nigerian Scammers

Scam Research

Mail Archives

Scam Books

Scam Books

Scam Term FAQ


Glossary of scam terms

Anti Scam Tools

Anti scam Tools

Scam Awareness Game

Scam Awareness Game

Scam Awareness Quiz

Scam Awareness Quiz


In the field of processor security, phishing is the illegally fake process of attempt to obtain receptive information such as usernames, passwords and credit card details by cloaked as a reliable thing in an electronic communication. Communications purport to be from well-liked social web sites, auction sites, online payment processors or IT administrators are normally used to tempt the innocent public.

Phishing is naturally accepted out by e-mail. or instant messaging and it frequently direct users to enter particulars at a counterfeit website whose look and feel are approximately indistinguishable to the genuine one. Phishing is an example of social engineering techniques used to fool users, and exploit the poor usability of existing web security technologies. Attempt to deal with the rising number of report phishing incidents include legislation, user training, public awareness, and technical security measures. A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996.

Damage caused by phishing

The break caused by phishing range from denial of access to e-mail to considerable monetary loss. It is probable that between May 2004 and May 2005, approximately 1.2 million computer users in the United States suffered losses caused by phishing, totaling about US$929 million. United States business drop an predictable US$2 billion per year as their clients become victims In 2007, phishing attacks escalated. 3.6 million Adults lost US$3.2 billion in the 12 months ending in August 2007. Microsoft claims these estimate are grossly blown up and puts the annual phishing loss in the US at US$60 million.[50] In the United Kingdom losses from web banking fraud—mostly from phishing—almost doubled to GB£23.2m in 2005, from GB£12.2m in 2004, while 1 in 20 computer users claimed to have lost out to phishing in 2005.

The posture adopted by the UK banking body APACS is that "customers must also take sensible precautions ... so that they are not vulnerable to the criminal." likewise, when the initial spate of phishing attacks hit the Irish Republic's banking sector in September 2006, the Bank of Ireland initially refuse to cover losses suffer by its customers (and it still insists that its policy is not to do so) although losses to the tune of €11,300 were made good.
How to distinguish phishing email messages or links?
Phishing email messages are deliberate to whip your uniqueness. They ask for private data, or direct you to websites or phone numbers to call where they ask you to offer individual data. A few clues can help you spot deceptive email messages or links within them.

What does a phishing email message look like?

Phishing email messages take a number of forms:

• They might emerge to approach from your bank or financial institution, a company you frequently do business with, such as Microsoft, or from your social networking site.

• They might come into view to be from somebody you in your email address book.

• They might ask you to make a phone call. Phone phishing scams straight you to call a phone number where a person or an audio response unit wait to take your account number, personal identification number, password, or other valuable personal data.

• They might include official-looking logos and other identifies information taken in a straight line from rightful websites, and they might include believable details about your personal history that scammers found on your social networking pages.

•They might include links to spoofed websites where you are asking to enter private information.

Here is a model of what a phishing scam in an email message might look like.

Model of a phishing email message

Example of a phishing email message that includes risk of report closure and malicious links designed to trick you into incoming your account information.

To make these phishing email messages seem even more rightful, the scam artist use graphics that appear to go to the legitimate websites (Windows Live Hotmail and Wood grove Bank, respectively), but really take you to a phony scam site or possibly a pop-up window that looks exactly like the official site.

Here are a few phrases that are commonly used in phishing email scams:

"Verify your account."

Business should not ask you to send passwords, logon information or user names, Social Security numbers, or other personal information through email.

If you receive an email message from Microsoft or any other business asking you to bring up to date your credit card information, do not respond: This is a phishing scam.

"You have won the lottery."

The lottery scam is a common phishing scam recognized as advanced fee fraud. One of the most ordinary forms of sophisticated fee fraud is a message that claims that you have won a huge sum of money, or that a person will shell out you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft. There is no Microsoft Lottery.

"If you don't respond within 48 hours, your account will be closed."

These messages suggest a intelligence of importance so that you'll react right away without idea. A phishing email message might even assert that your retort is necessary because your account might have been compromised.

What does a phishing link look like?

Sometimes phishing email messages direct you to spoofed websites.

HTML-formatted messages can contain links or forms that you can plug out very soon as you would fill out a form on a rightful website.

Phishing links that you are urged to tick in email messages, on websites, or yet in immediate messages, may contain all or part of a real company's name and are frequently cloaked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate website.

Become aware of in the subsequent example that latent (but not clicking) your mouse pointer on the link discloses the actual web address, as shown in the box with the yellow background. The string of cryptic figures looks nothing like the company's web address. This is a doubtful sign.

Example of a masked web address.

Cybercriminals also use web addresses that look like the names of famous companies but are somewhat distorted by adding, omitting, or transposing letters. For example, the address "" could appear instead as:




This is called "typo-squatting" or "cyber squatting." is dedicated to all the hardworking people who have been scammed by the spammer or 419 scam frauds. Although our site concentrates on providing awareness of Nigerian 419 spam (scam), scam baiting, advance fee fraud, scam phising, also we deal with other types of fraud such as letter spam, e-mail scam, lottery spam as well. You can go through our scam baiting tips, it is just amazing way to deal with the spammer or scammer.

Nigerian Scam  |   419 Scam   |   Features of Scam  |   Mission  |   Research  |   Mail Archives  |   About Us   |   File A Complaint  |   Spam News  |   Origin Of Scam   |   Operation Of Scam   |   Consequences   |   Miscellaneous Scams   |   Scam Sites   |   FAQ   |   Contact Us  |   Scam Resources Links  |   Nigerian Scammers  |   Site Map  |   Mail Archives SiteMap  |   Scam Glossary  |   Scam Resources Books  |   Scam Checker Tool  |   Scam baiting   |   More Scam Sites  |  Scam Awareness Quiz  |   Celebrity Scam  |  Search Engine Genie  |   Bharat Udyog Ratna Award Scam Alert  |   Jeff Adams Real Estate Seminar   |   Russ Whitney Real Estate

free hit counter