Website Builders.com

  • Home
  • Builder Reviews
        • Our team have carefully reviewed a selection of premium website building platform, making it easier for you to choose the right one.

          While most website builders are compatible for generic  website building, including online stores, blogs and generic websites, some are better than others depending on what your website type.

        • Website Builder Reviews

          GoDaddy

          IM Creator

          Jimdo

          Squarespace

          Voog

          Weebly

          Wix

          WordPress

        • Store Builder Reviews

          BigCommerce

          GoDaddy Store

          Shopify

          Weebly

          Wix

          Yola

        • Comparisons

          Wix vs. Weebly

          Shopify vs. BigCommerce

  • Start A Blog
  • How To Guides
        • With over 500 pages of detailed tutorials and guides, our guides cover a large chunk of online topics.

          Learn crafty tips and tricks to make your time online smooth. Our directory is useful for internet newbies, as well as aspiring website builders.

          Check out the full directory.

        • Building a Website

          How To Build a Website

          Name Your Website – Domain

          Picking a Web Hosting Service

          Content and User Experience

          More

        • Searching and Research

          Searching the Web

          Doing Research Online

          The World of Wiki

          Finding Videos Online

          More

        • E-mails – Basics and Advanced

          Getting Started

          Sending an E-mail Message

          Opening Attachments

          Sending Attachments

          More

        • Social Media & Communication

          Instant Messaging

          Online Networking

          Facebook

          LinkedIn

          More

        • Files, Downloads, Software & Installs

          File Formats and Extensions

          Install Plug-Ins

          How to Download Files

          Downloading Software

          More

        • Making Money Online

          Making Money with Facebook

          Affiliate Marketing

          Virtual Assistant

          Writing Articles

          More

        • Online Shopping

          10 Tips for Smart and Safe Shopping

          Smart Shopping

          Protecting Personal Information

          Looking for Discounts

          More

  • Website Builder Tools Your Business Can’t Do Without (+ Links To Useful Resources)
    • HTML Character Codes
    • Advertiser Tracking Cookies: There ARE Ways To Opt Out – Here’s How
    • Website Glossary
  • Our Blog
        • Recent Posts

          When you have awesome writers, it is easy to spread wisdom. Take a look at some of our recent posts on various internet and website related topics.

          Have any suggestions on topics? Don’t hold back, send us your ideas:

          [email protected]

        • 12 Simple Rules on How to Use E-mail Politely

          Live Chat Software: Is it Worth It? Facebook Says Yes.

          Algorithmic Warfare: Is it the Beginning or the End?

          How to Promote Your Pet Business Online

          DIY Marketing: 7 Steps for any Business Owner

        • 20 Ideas to Generate Your First Online Sale

          Complete Guide to Content Marketing

          8 Best Free Photo Editors for Product Photosraphy

          Press Kits: DIY to Free Media Hype

          Why Backlinks are Essential for SEO – How To Build Them

  • About Us
    • Contact Us
    • FAQ
    • How Did You Make This Site?
    • How the Website Is Funded
    • Our Team
You are here: Home / The Complete List Of How-To Tutorials For Internet Dummies / Beat Baddies & Enjoy Surfing: 11 Wise Ways To Stay Safe Online In 2023 / Do Not Get Caught in the Phish Trap

Do Not Get Caught in the Phish Trap

Disclosure: Your support helps keep the site running! We earn a referral fee for some of the services we recommend on this page. Learn more

Identity thieves prey on your personal data — credit card information, social security number, and account passwords. They are trying to steal from you, using data they collect.

Identity thieves get their information about you from a variety of sources — spyware, viruses, your trash, hacking into databases. But would you believe that one of the biggest sources of compromised data is people just giving their information away themselves? Of course, people don’t know they are doing this, but they are doing it. It happens every single day — people becoming to a scam called phishing.

Phishing is when someone masquerades as a trusted entity to trick you into giving them your personal information.

Contents

  • 1 How does Phishing work?
  • 2 What are Phishers Looking For?
  • 3 How To Tell if a Message is Legitimate
  • 4 How To Protect Yourself
  • 5 What to do if You Become a Phishing Victim

How does Phishing work?

Phishing is a low-level form of social engineering — manipulating people into providing secure or confidential information. What makes it “phishing” specifically, is that the attacker masquerades as a trusted entity.

For example:

  • Users might get an email claiming to come from PayPal, telling them to log into their account and update some critical information. The victim clicks on a link within the email, which goes to a fake site that looks like PayPal. By trying to log in at that site, the victim is providing their username and password to the attackers.
  • A message might appear to come from a bank, claiming that fraudulent activity has been reported, with a link to “verify identity.” The link in the email leads to a site which asks the user to enter bank account numbers or social security numbers.

All phishing schemes have two things in common:

  • An attempt to get the victim to provide sensitive data.
  • Messages claiming to come from a trusted source, but which are actually sent by an attacker.

What are Phishers Looking For?

The information most often collected by phishing scams include the data most often coveted by identity thieves:

  • Credit card information.
  • Social Security numbers.
  • Bank account numbers.
  • Website account login information (username and password), especially for finance-related accounts like PayPal and online banks.
  • Personal data such as address, phone number, and date of birth.

How To Tell if a Message is Legitimate

Most phishing schemes involve one or more of the following:

  • Requests to “verify” data
  • Claims of possible fraudulent charges
  • Warnings of unauthorized login

Phishing messages are, by definition, unsolicited. The email “from” addresses are usually spoofed — which means the email can appear to come from a legitimate address, even though it didn’t.

Things to look for include:

  • Links to URLs other than the domain name you are used to for the account. For example, a PayPal-based phishing scheme might link to a URL like http://paypal.com.example.com — that looks like PayPal’s domain, but if you look closer, you can see that it isn’t. (This is a good reason to understand what a URL is supposed to look like.)
  • Bad graphics, typos, or a design style that is atypical for the company being represented.
  • Claims that action must be taken by a certain date.
  • A lack of personalization (your name or username) in the text of the email.

How To Protect Yourself

Email spoofing is a way phishers can make an email look like it was sent by a trustworthy entity.

You should NEVER provide you credit card or social security number in reply to an unsolicited message. Always check the URL of any links you follow from emails, especially if they claim account action is needed on your part – better yet, navigate directly to a website (by typing the address into the address bar on your browser) instead of following links from emails. Report any suspicious emails to the company they seem to represent — they can verify whether it is legitimate or fraudulent.

What to do if You Become a Phishing Victim

If you are the victim of a phishing scam, don’t panic. You simply need to calmly deal with the problems:

  • Figure out what information was compromised.
  • Change any passwords or other login information that was compromised.
  • Contact the service provider or company where your account was compromised, and inform them of the situation.
  • If it is possible that your credit card information was compromised, call the credit card company and report it. They will issue you new cards.
  • Think about secondary accounts that might have been compromised by the breach. For example, if you have a credit card linked to a PayPal account, and your PayPal account was compromised, you should get your credit cards provider involved as well.
  • Be sure to talk to the provider of the compromised account, and inform them of fraudulent charges. Most companies have fraud prevention departments that can help you, even if charges have already been made against your card.
  • Contact your local police department to discuss filing a police report.
  • Get a copy of your credit report immediately and again in a few months. Look for any recent activity that you do not recognize.
  • Once you’ve identified the source of the breach, try to avoid making the same mistakes in the future.

Latest Posts

Hosting

Black Friday 2023: Website Builder & Web Hosting Deals For Webmasters [Updated]

Uncategorized

Why WebsiteBuilders.com Got Hacked (Yes, You Can Blame Social Warfare)

E-mail Internet

E-Mail Etiquette: 12 Basic Rules For Politely Using E-Mail

Marketing social networking

Live Chat Software: Should You Invest In It? (It’s Easier Than You Think)

Computer Science

Never Heard Of Algorithmic Warfare? Then You’d Better Read This

Marketing

How To Successfully Promote Your Pet Business Online With Minimum Effort

Most Popular Reviews

  • Website Builder Reviews
  • Wix
  • Weebly
  • Squarespace
  • GoDaddy Website Builder
  • Shopify

Recent Posts

  • Black Friday 2023: Website Builder & Web Hosting Deals For Webmasters [Updated] November 5, 2019
  • Why WebsiteBuilders.com Got Hacked (Yes, You Can Blame Social Warfare) March 23, 2019
  • E-Mail Etiquette: 12 Basic Rules For Politely Using E-Mail November 15, 2017

About WebsiteBuilders.com

Everything you need to know about the WebsiteBuilders.com team.

About Us

Our Team

How The Website Is Funded

Privacy Policy

© 2017-2022 Website Builders.com | Sitemap