Phishing E-mail Fraud Hits Seton Hall Community
Seton Hall community members of Seton Hall University, NJ, USA, recently reported of getting phishing e-mails that talked of storage restrictions, while posing as communications from Seton Hall University. They (members) also reported of finding pop-up links that solicited their private information through an e-mail.
It's noted that phishing scams involve a trustworthy entity like Seton Hall University in this instance, although they, in reality, are from online thieves stealing users' identities.
Paul Fisher, Director of the Teaching, Learning and Technology Center said that phishing scams didn't affect computers; they harmed the users, as reported by thesetonian.com on April 8, 2010.
The Director further said that when e-mail users receive an e-mail requesting for sensitive data or direct them onto a website, which appears genuine, the senders i.e. the scammers typically seize those users' personal information. Subsequently, based on those details provided as part of a reply to the message or as input to the fake site, the fraudsters compromise those users' different accounts, including e-mail accounts and also take up their identities, Fisher added.
Evidently, Seton Hall University has brought the situation under control through different filtering tools, which prevent spam or phishing e-mails from spreading onto the students' inboxes.
Additionally, the IT services and the University are spreading awareness among the University Community that Seton Hall won't ever tell users to follow a given Web-link for entering personal information or providing details through e-mails.
More recommendations are given so that people don't fall victim to such phishing scams. These are: treating an e-mail with suspicion if it asks the recipient to provide personal information, and making sure that the user is on a duly protected website while entering payment card information or other details of sensitive nature.
Moreover, a Web browser toolbar must be installed for warding off fake websites. While monitoring user's navigation processes, these toolbars alert the users after consulting their lists of known phishing sites. Also, credit/debit card and bank statements must be regularly checked for any unauthorized transaction.
Above all, it's most crucial to delete such e-mails the moment they seem suspicious Technology Help Desk phone-numbers should be dialed and their authenticity confirmed.
Related article: Phishing With A Redirector Code
» SPAMfighter News - 20-04-2010