False Sense of Security

Lehrman, Paul D.
April 2006
Mix;Apr2006, Vol. 30 Issue 4, p30
The article discusses the threat on the Internet security. It focuses on the scams done through the net by scamsters who use social engineering as their weapon. These type of scams fall under the category of phishing. It means using a phony but authentic-looking e-mail that prompts one to disclose his secure information to scumbags who will then use it for his disadvantage. A demonstration of an eBay scam is presented.


Related Articles

  • A Phishy Business. Baker, Glenn // New Zealand Management;Jun2004, Vol. 51 Issue 5, p23 

    Provides information on phishing scams, a fraudulent computer activity that utilizes e-mails and Web sites to attract users to provide financial data. Warnings from the State Services Commission about the use of e-mails; Rate of worldwide phishing as of August 2003.

  • A tale of stupidity and liability. Schwartau, Winn // Network World;6/7/2004, Vol. 21 Issue 23, p53 

    While computer viruses and worms relentlessly pound away at our perimeters, the latest challenge to corporate and small office/home office users is phishing. This is where you, the user, are the fish, susceptible to the enticements of the phisherman, and you break diown your own security...

  • A blueprint for taking back control of email as a communication channel. Tucker, Edward // Computer Weekly;1/13/2015, p13 

    In the article, the author offers tips on how to fight fraudulent electronic mail (email), spam or phishing in the Internet industry. He claims that fraudulent emails are among the tools used in cyber crime, which is estimated to cost over 20 billion pounds per year worldwide. He cites the paper...

  • Letters. Turner, Andrew; Clarke, David; Richardson, Neil // ITNOW;May2011, Vol. 53 Issue 3, p23 

    Several letters to the editor are presented in response to articles in previous issues including an article on the problems with cybercrime in the February 5, 2011 issue, a response by David Clarke to the article, and "What Is Information," by Chris Yapp in the March issue.

  • Don't get hooked. Flucke, John // Dental Practice Report;Jan/Feb2005, Vol. 13 Issue 1, p11 

    The article presents information about Internet scam and the ways to deal with it. The scam is called "phishing" and it goes like this. The person gets an e-mail from what appears to be a trusted source. It will be professionally worded and carry the logo of the company or institution. The...

  • Survey shows internet abuse is rife. Goodwin, Bill // Computer Weekly;2/27/2004, p4 

    The effectiveness of employers' IT security policy enforcement has been called into question by a study which found that more than 50% of organisations have had to discipline staff for misusing e-mail and the Internet at work. A survey of more than 200 IT security professionals by "Computer...

  • Increasing My Q Factor. Cringely, Robert X. // InfoWorld;6/20/2005, Vol. 27 Issue 25, p6 

    Presents updates on the information technology industry in the U.S. as of June 2005. Information on the breach of computer security of the CitiFinancial division of Citibank; Cause of the electronic mail problem encountered by Adobe; Information on the software about writing a memorable eulogy.

  • Five tips to prevent hackers from screwing up your digital life. Kalehoff, Max // Hudson Valley Business Journal;9/3/2012, Vol. 1 Issue 6, p8 

    The article presents five tips in preventing hackers in stealing your personal information online. It mentions that making two factor e-mail authentication is important to ensure that no one can log in your account. It says that using different password with strong root password in different...

  • E-Mail Crooks Target Webmail Accounts. Larkin, Erik // PCWorld;Jun2009, Vol. 27 Issue 6, p39 

    The article reports on Webmail accounts as a major target of attackers' scam e-mail. It is noted that scammers are accessing such accounts to send e-mail messages to the victims' entire contact list, often touting a Web site or even asking for money directly. Among the victims was former...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics