• Phishing Signs

    From Daryl Stout@454:1/33 to All on Tue Mar 1 00:01:38 2022
    Phishing is the fraudulent practice of sending emails that appear to
    be from a reputable company, with the goal of getting you to share
    sensitive information. Often, the targeted information includes login credentials, credit card information, bank account details, or other
    personal information. You may be less familiar with spear-phishing,
    which is a highly targeted form of phishing. Unlike a general phishing
    attack that casts a very wide net (sending generic, mass emails), a spear-phishing attack is personalized with specific details about the
    message's recipient.

    Spear-phishing attackers may gather personal information from your
    social media accounts, or the dark web, to create messages that appear
    to come from trusted sources -- like companies or even individuals that
    you know. They use these personal details to trick you into taking an
    action that could cause you to share even more personal information.
    Most frequently, the attacker suggests clicking a link or downloading
    software that contains malware or spyware, which could compromise your
    personal and account information, potentially including financial and
    banking accounts.

    Think of unknown emails, texts or phone calls as someone at your door.
    If you don't recognize them, and would not readily let them into your
    house, then don't invite them onto your phone or computer.

    Here are some tips to check if an email or text is legitimate, and
    how to deal with unsolicited emails, calls and texts.

    Hover over the "from" email address to see the full address, and
    make sure it is one you recognize and trust.

    Look for domain names that are slightly different or misspelled. For
    example, an attacker might send emails from domains you are familiar
    with, but the address will have a slight misspelling from the actual
    website.

    Legitimate companies will NEVER ask you to send sensitive information,
    such as passwords, bank account information, social security numbers,
    date of birth, or medical information in an email, chat session, or
    support call.

    They will NEVER ask you to type your username or passwords into any
    website, outside of their websites, web apps.

    If you get a call from a company you deal with, or any government
    agency, tell them nothing, instead offer to call them back. Get their
    number and a name. THEN verify the number given against information
    you already know about the company.

    You can also check phone numbers at several sites to see if they have
    been listed as scam call numbers.

    https://www.fraudnumber.com

    http://badnumbers.info

    https://www.scam-detector.com/article/phone-number-finder.

    More ways to stay safe

    Few people still pick up phone calls from unknown numbers, but if you
    do, you need to listen closely to what the person on the other end
    says. If you receive a call and immediately hear the phrase "Can you
    hear me?," hang up.

    The phrase is used to coax you into saying "yes," a word that, if said
    in your voice, is as good as gold for con artists. They can then use
    your voiced word to say you agreed to give them money, or use your
    credit card for a purchase.

    Do NOT click on links or attachments in emails or text messages from
    senders that you do not recognize. Delete the text/email, and then
    contact the company from information you have in your files.

    When you "hover" over an email address, if any part has a jumble of
    letters or characters, it is likely a phishing address.

    Be especially wary of attachments like .zip or .pdf and particularly
    of executable file types (like those that end in .EXE). If you do not
    know the sender personally, you should never download or click these attachments.

    Do not provide sensitive personal information (like usernames and
    passwords) over email.

    Do not fall for messages that claim to be "urgent" or "time-sensitive".
    Often, scammers will try to scare you into sharing your personal
    information. Always take time to verify the identity of the requester
    and remember that Quicken and other reputable businesses will not ask
    you to provide sensitive information over email or over the phone.

    Pay attention to even seemingly harmless requests. A common ploy
    scammers use is emailing you a link to do something like change your
    account password. The link, in reality, will download malware or
    spyware.

    Do not open any document that you're not expecting to receive.

    If you can't tell if an email or text is legitimate, err on the side
    of caution and delete it. You can always call the business directly
    with any questions or concerns.

    Here is a link to the consumer fraud page to read about the most
    current scams in the field today.

    https://www.consumer.ftc.gov/taxonomy/term/874
    **********************
    --- SBBSecho 3.14-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)
  • From Daryl Stout@454:1/33 to All on Tue Nov 1 00:07:19 2022
    Phishing is the fraudulent practice of sending emails that appear to
    be from a reputable company, with the goal of getting you to share
    sensitive information. Often, the targeted information includes login credentials, credit card information, bank account details, or other
    personal information. You may be less familiar with spear-phishing,
    which is a highly targeted form of phishing. Unlike a general phishing
    attack that casts a very wide net (sending generic, mass emails), a spear-phishing attack is personalized with specific details about the
    message's recipient.

    Spear-phishing attackers may gather personal information from your
    social media accounts, or the dark web, to create messages that appear
    to come from trusted sources -- like companies or even individuals that
    you know. They use these personal details to trick you into taking an
    action that could cause you to share even more personal information.
    Most frequently, the attacker suggests clicking a link or downloading
    software that contains malware or spyware, which could compromise your
    personal and account information, potentially including financial and
    banking accounts.

    Think of unknown emails, texts or phone calls as someone at your door.
    If you don't recognize them, and would not readily let them into your
    house, then don't invite them onto your phone or computer.

    Here are some tips to check if an email or text is legitimate, and
    how to deal with unsolicited emails, calls and texts.

    Hover over the "from" email address to see the full address, and
    make sure it is one you recognize and trust.

    Look for domain names that are slightly different or misspelled. For
    example, an attacker might send emails from domains you are familiar
    with, but the address will have a slight misspelling from the actual
    website.

    Legitimate companies will NEVER ask you to send sensitive information,
    such as passwords, bank account information, social security numbers,
    date of birth, or medical information in an email, chat session, or
    support call.

    They will NEVER ask you to type your username or passwords into any
    website, outside of their websites, web apps.

    If you get a call from a company you deal with, or any government
    agency, tell them nothing, instead offer to call them back. Get their
    number and a name. THEN verify the number given against information
    you already know about the company.

    You can also check phone numbers at several sites to see if they have
    been listed as scam call numbers.

    https://www.fraudnumber.com

    http://badnumbers.info

    https://www.scam-detector.com/article/phone-number-finder.

    More ways to stay safe

    Few people still pick up phone calls from unknown numbers, but if you
    do, you need to listen closely to what the person on the other end
    says. If you receive a call and immediately hear the phrase "Can you
    hear me?," hang up.

    The phrase is used to coax you into saying "yes," a word that, if said
    in your voice, is as good as gold for con artists. They can then use
    your voiced word to say you agreed to give them money, or use your
    credit card for a purchase.

    Do NOT click on links or attachments in emails or text messages from
    senders that you do not recognize. Delete the text/email, and then
    contact the company from information you have in your files.

    When you "hover" over an email address, if any part has a jumble of
    letters or characters, it is likely a phishing address.

    Be especially wary of attachments like .zip or .pdf and particularly
    of executable file types (like those that end in .EXE). If you do not
    know the sender personally, you should never download or click these attachments.

    Do not provide sensitive personal information (like usernames and
    passwords) over email.

    Do not fall for messages that claim to be "urgent" or "time-sensitive".
    Often, scammers will try to scare you into sharing your personal
    information. Always take time to verify the identity of the requester
    and remember that Quicken and other reputable businesses will not ask
    you to provide sensitive information over email or over the phone.

    Pay attention to even seemingly harmless requests. A common ploy
    scammers use is emailing you a link to do something like change your
    account password. The link, in reality, will download malware or
    spyware.

    Do not open any document that you're not expecting to receive.

    If you can't tell if an email or text is legitimate, err on the side
    of caution and delete it. You can always call the business directly
    with any questions or concerns.

    Here is a link to the consumer fraud page to read about the most
    current scams in the field today.

    https://www.consumer.ftc.gov/taxonomy/term/874
    **********************
    --- SBBSecho 3.15-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)
  • From Daryl Stout@454:1/33 to All on Wed Mar 1 00:08:26 2023
    Phishing is the fraudulent practice of sending emails that appear to
    be from a reputable company, with the goal of getting you to share
    sensitive information. Often, the targeted information includes login credentials, credit card information, bank account details, or other
    personal information. You may be less familiar with spear-phishing,
    which is a highly targeted form of phishing. Unlike a general phishing
    attack that casts a very wide net (sending generic, mass emails), a spear-phishing attack is personalized with specific details about the
    message's recipient.

    Spear-phishing attackers may gather personal information from your
    social media accounts, or the dark web, to create messages that appear
    to come from trusted sources -- like companies or even individuals that
    you know. They use these personal details to trick you into taking an
    action that could cause you to share even more personal information.
    Most frequently, the attacker suggests clicking a link or downloading
    software that contains malware or spyware, which could compromise your
    personal and account information, potentially including financial and
    banking accounts.

    Think of unknown emails, texts or phone calls as someone at your door.
    If you don't recognize them, and would not readily let them into your
    house, then don't invite them onto your phone or computer.

    Here are some tips to check if an email or text is legitimate, and
    how to deal with unsolicited emails, calls and texts.

    Hover over the "from" email address to see the full address, and
    make sure it is one you recognize and trust.

    Look for domain names that are slightly different or misspelled. For
    example, an attacker might send emails from domains you are familiar
    with, but the address will have a slight misspelling from the actual
    website.

    Legitimate companies will NEVER ask you to send sensitive information,
    such as passwords, bank account information, social security numbers,
    date of birth, or medical information in an email, chat session, or
    support call.

    They will NEVER ask you to type your username or passwords into any
    website, outside of their websites, web apps.

    If you get a call from a company you deal with, or any government
    agency, tell them nothing, instead offer to call them back. Get their
    number and a name. THEN verify the number given against information
    you already know about the company.

    You can also check phone numbers at several sites to see if they have
    been listed as scam call numbers.

    https://www.fraudnumber.com

    http://badnumbers.info

    https://www.scam-detector.com/article/phone-number-finder.

    More ways to stay safe

    Few people still pick up phone calls from unknown numbers, but if you
    do, you need to listen closely to what the person on the other end
    says. If you receive a call and immediately hear the phrase "Can you
    hear me?," hang up.

    The phrase is used to coax you into saying "yes," a word that, if said
    in your voice, is as good as gold for con artists. They can then use
    your voiced word to say you agreed to give them money, or use your
    credit card for a purchase.

    Do NOT click on links or attachments in emails or text messages from
    senders that you do not recognize. Delete the text/email, and then
    contact the company from information you have in your files.

    When you "hover" over an email address, if any part has a jumble of
    letters or characters, it is likely a phishing address.

    Be especially wary of attachments like .zip or .pdf and particularly
    of executable file types (like those that end in .EXE). If you do not
    know the sender personally, you should never download or click these attachments.

    Do not provide sensitive personal information (like usernames and
    passwords) over email.

    Do not fall for messages that claim to be "urgent" or "time-sensitive".
    Often, scammers will try to scare you into sharing your personal
    information. Always take time to verify the identity of the requester
    and remember that Quicken and other reputable businesses will not ask
    you to provide sensitive information over email or over the phone.

    Pay attention to even seemingly harmless requests. A common ploy
    scammers use is emailing you a link to do something like change your
    account password. The link, in reality, will download malware or
    spyware.

    Do not open any document that you're not expecting to receive.

    If you can't tell if an email or text is legitimate, err on the side
    of caution and delete it. You can always call the business directly
    with any questions or concerns.

    Here is a link to the consumer fraud page to read about the most
    current scams in the field today.

    https://www.consumer.ftc.gov/taxonomy/term/874
    **********************
    --- SBBSecho 3.14-Win32
    * Origin: The Thunderbolt BBS - Little Rock, Arkansas (454:1/33)