Psychological Internet Security: Drawing a Spider to the Web
While you have probably heard about pharming as well as the dangers that come from surfing to sites containing pornography, warez (illegal downloads) and other underground-related sites, pharming can virtually affect any topic of any industry. As long as sensitive information can be extracted from you, pharming scams will be developed. After all, people can act like lemmings on the internet; one by one, they will stumble into the pharming scam and do exactly what the scam artists want them to do.
So you're probably wondering what pharming is and how it can compromise your computer protection and internet security. Simply put, it is like an evolved form of phishing. Instead of the scam artists trying to convince you to visit a fraudulent site, they just build tons of fraudulent sites and let you visit them through redirection tactics. While the details of these redirection tactics are beyond the scope of this article, it is important to know that financially-related websites are the primary targets of pharming scams.
As you can understand, it is extremely difficult to identify pharming scams because you have no idea when you visit one. But is this really the case? For many, the warnings literally pop up in front of their eyes, but they have simply trained themselves to ignore the computer protection and internet security signs. The question is, are you one of these people?
Answer this: have you ever browsed to a place where you are greeted with an internet security warning stating you just entered a site with an unsigned certificate? If you have, did you simply agree to view the site and not even bother to wonder why there was an unsigned certificate internet security warning? Well, that warning box could mean the loss of your identity if you are not careful enough. For scammers to set up these pharming websites, they try to duplicate every aspect of the real site as possible, including the certificates. If you ignore these unsigned certificate warnings and enter your personal information, you literally send it all to the scammers.
To help identify these scams, click File > Properties in your browser and make sure the website is an actual domain name instead of an IP address. Simply looking at the address bar of a pharming site is not enough, for scammers have ways to cloak it. Also, make sure that yellow lock is in the bottom right-hand corner of your browser window. That lock signifies SSL, which means your information is being transferred over a securely encrypted channel.
When it comes to additional computer protection and internet security, grab a free legitimate anti-phishing toolbar. Also make sure to install the most current updates for your antivirus software.
In the end, remember internet security and computer protection means using common sense and judgment when surfing the web. For any sites that require you to enter personal information, make sure you analyze the website like discussed above. In spending the additional time it takes to do this, you will dramatically increase your computer protection and online security, all without spending a penny.
Related Tags: website, websites, fraud, phishing, internet security, computer protection, pharming, pharm, phish
Josh George has been an active member in the computer security and internet security community since 1998. He has made many presentations to groups that involved members from the FBI, DoD, and NSA and hopes to now help personal and small business users. To learn more about computer security and internet security, the link below provides time-tested best practices and recommended tools: Computer Protection
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - How To Compare Residential VOIP Offerings
Many people are turning to VOIP phone for several different reasons, the biggest reason being cost.
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - A to Z of Mac Parts
The Mac OS: Mac OS runs smoothly. That's what I noticed first off. There's very little waiting, very