Phishing: How to Protect Your Computer
- They might appear to come from a friend, colleague, business you regularly do business with, or from social networking site.
- A variant called spear phishing is a targeted form in which an e-mail message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the organization, such as the head of human resources or I/T. They are more specific in that the topic of discussion is specific to an interest of yours.
- They might ask you to make a phone call. Phone phishing scams direct you to call a customer support phone number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. The phone phisher might claim that your account will be closed or other problems could occur if you don't respond.
- They might include official-looking logos and other identifying information taken directly from legitimate Web sites, and they might include convincing details about your personal information that scammers found on your social networking pages.
- They might include links to fake Web sites where you are asked to enter personal information.
Report Spam (Listed on Global Address List) or ReportSpam@state.sd.us