Loading ...
Sorry, an error occurred while loading the content.

File - phishing.txt

Expand Messages
  • CraftonReunion@yahoogroups.com
    About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
    Message 1 of 29 , Mar 2, 2013
    • 0 Attachment
      About Phishing Scams

      How Do Phishing Scams Work?

      Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

      -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

      Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

      If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

      How to Recognize and Avoid Phishing Scams

      1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

      Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

      2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

      Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

      If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

      3. Be extremely careful if you share personal or financial information online.

      Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

      4. If you submit information to a Web site, make sure the site is secure.

      Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

      5. Review credit card and other account statements regularly.

      If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

      6. Keep your operating system and Web browser up to date.

      To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

      7. Install and run anti-virus software and update it frequently.

      No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

      8. Run Spyware Protection software regularly.

      Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

      9. Run firewall software on your computer.

      A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

      10. Report any phishing scams you receive to the following organizations:

      Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

      Forward the entire e-mail to the Federal Trade Commission at spam@....
    • CraftonReunion@yahoogroups.com
      About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
      Message 2 of 29 , Apr 1, 2013
      • 0 Attachment
        About Phishing Scams

        How Do Phishing Scams Work?

        Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

        -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

        Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

        If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

        How to Recognize and Avoid Phishing Scams

        1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

        Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

        2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

        Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

        If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

        3. Be extremely careful if you share personal or financial information online.

        Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

        4. If you submit information to a Web site, make sure the site is secure.

        Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

        5. Review credit card and other account statements regularly.

        If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

        6. Keep your operating system and Web browser up to date.

        To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

        7. Install and run anti-virus software and update it frequently.

        No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

        8. Run Spyware Protection software regularly.

        Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

        9. Run firewall software on your computer.

        A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

        10. Report any phishing scams you receive to the following organizations:

        Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

        Forward the entire e-mail to the Federal Trade Commission at spam@....
      • CraftonReunion@yahoogroups.com
        About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
        Message 3 of 29 , May 1 3:23 PM
        • 0 Attachment
          About Phishing Scams

          How Do Phishing Scams Work?

          Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

          -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

          Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

          If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

          How to Recognize and Avoid Phishing Scams

          1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

          Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

          2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

          Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

          If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

          3. Be extremely careful if you share personal or financial information online.

          Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

          4. If you submit information to a Web site, make sure the site is secure.

          Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

          5. Review credit card and other account statements regularly.

          If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

          6. Keep your operating system and Web browser up to date.

          To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

          7. Install and run anti-virus software and update it frequently.

          No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

          8. Run Spyware Protection software regularly.

          Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

          9. Run firewall software on your computer.

          A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

          10. Report any phishing scams you receive to the following organizations:

          Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

          Forward the entire e-mail to the Federal Trade Commission at spam@....
        • CraftonReunion@yahoogroups.com
          About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
          Message 4 of 29 , Jun 2, 2013
          • 0 Attachment
            About Phishing Scams

            How Do Phishing Scams Work?

            Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

            -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

            Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

            If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

            How to Recognize and Avoid Phishing Scams

            1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

            Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

            2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

            Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

            If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

            3. Be extremely careful if you share personal or financial information online.

            Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

            4. If you submit information to a Web site, make sure the site is secure.

            Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

            5. Review credit card and other account statements regularly.

            If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

            6. Keep your operating system and Web browser up to date.

            To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

            7. Install and run anti-virus software and update it frequently.

            No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

            8. Run Spyware Protection software regularly.

            Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

            9. Run firewall software on your computer.

            A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

            10. Report any phishing scams you receive to the following organizations:

            Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

            Forward the entire e-mail to the Federal Trade Commission at spam@....
          • CraftonReunion@yahoogroups.com
            About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
            Message 5 of 29 , Aug 1, 2013
            • 0 Attachment
              About Phishing Scams

              How Do Phishing Scams Work?

              Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

              -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

              Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

              If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

              How to Recognize and Avoid Phishing Scams

              1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

              Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

              2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

              Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

              If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

              3. Be extremely careful if you share personal or financial information online.

              Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

              4. If you submit information to a Web site, make sure the site is secure.

              Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

              5. Review credit card and other account statements regularly.

              If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

              6. Keep your operating system and Web browser up to date.

              To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

              7. Install and run anti-virus software and update it frequently.

              No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

              8. Run Spyware Protection software regularly.

              Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

              9. Run firewall software on your computer.

              A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

              10. Report any phishing scams you receive to the following organizations:

              Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

              Forward the entire e-mail to the Federal Trade Commission at spam@....
            • CraftonReunion@yahoogroups.com
              About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
              Message 6 of 29 , Sep 1, 2013
              • 0 Attachment
                About Phishing Scams

                How Do Phishing Scams Work?

                Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                How to Recognize and Avoid Phishing Scams

                1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                3. Be extremely careful if you share personal or financial information online.

                Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                4. If you submit information to a Web site, make sure the site is secure.

                Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                5. Review credit card and other account statements regularly.

                If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                6. Keep your operating system and Web browser up to date.

                To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                7. Install and run anti-virus software and update it frequently.

                No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                8. Run Spyware Protection software regularly.

                Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                9. Run firewall software on your computer.

                A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                10. Report any phishing scams you receive to the following organizations:

                Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                Forward the entire e-mail to the Federal Trade Commission at spam@....
              • CraftonReunion@yahoogroups.com
                About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                Message 7 of 29 , Oct 1, 2013
                • 0 Attachment
                  About Phishing Scams

                  How Do Phishing Scams Work?

                  Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                  -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                  Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                  If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                  How to Recognize and Avoid Phishing Scams

                  1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                  Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                  2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                  Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                  If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                  3. Be extremely careful if you share personal or financial information online.

                  Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                  4. If you submit information to a Web site, make sure the site is secure.

                  Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                  5. Review credit card and other account statements regularly.

                  If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                  6. Keep your operating system and Web browser up to date.

                  To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                  7. Install and run anti-virus software and update it frequently.

                  No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                  8. Run Spyware Protection software regularly.

                  Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                  9. Run firewall software on your computer.

                  A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                  10. Report any phishing scams you receive to the following organizations:

                  Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                  Forward the entire e-mail to the Federal Trade Commission at spam@....
                • CraftonReunion@yahoogroups.com
                  About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                  Message 8 of 29 , Nov 1, 2013
                  • 0 Attachment
                    About Phishing Scams

                    How Do Phishing Scams Work?

                    Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                    -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                    Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                    If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                    How to Recognize and Avoid Phishing Scams

                    1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                    Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                    2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                    Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                    If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                    3. Be extremely careful if you share personal or financial information online.

                    Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                    4. If you submit information to a Web site, make sure the site is secure.

                    Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                    5. Review credit card and other account statements regularly.

                    If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                    6. Keep your operating system and Web browser up to date.

                    To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                    7. Install and run anti-virus software and update it frequently.

                    No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                    8. Run Spyware Protection software regularly.

                    Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                    9. Run firewall software on your computer.

                    A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                    10. Report any phishing scams you receive to the following organizations:

                    Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                    Forward the entire e-mail to the Federal Trade Commission at spam@....
                  • CraftonReunion@yahoogroups.com
                    About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                    Message 9 of 29 , Dec 1, 2013
                    • 0 Attachment
                      About Phishing Scams

                      How Do Phishing Scams Work?

                      Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                      -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                      Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                      If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                      How to Recognize and Avoid Phishing Scams

                      1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                      Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                      2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                      Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                      If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                      3. Be extremely careful if you share personal or financial information online.

                      Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                      4. If you submit information to a Web site, make sure the site is secure.

                      Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                      5. Review credit card and other account statements regularly.

                      If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                      6. Keep your operating system and Web browser up to date.

                      To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                      7. Install and run anti-virus software and update it frequently.

                      No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                      8. Run Spyware Protection software regularly.

                      Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                      9. Run firewall software on your computer.

                      A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                      10. Report any phishing scams you receive to the following organizations:

                      Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                      Forward the entire e-mail to the Federal Trade Commission at spam@....
                    • CraftonReunion@yahoogroups.com
                      About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                      Message 10 of 29 , Jan 1, 2014
                      • 0 Attachment
                        About Phishing Scams

                        How Do Phishing Scams Work?

                        Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                        -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                        Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                        If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                        How to Recognize and Avoid Phishing Scams

                        1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                        Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                        2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                        Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                        If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                        3. Be extremely careful if you share personal or financial information online.

                        Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                        4. If you submit information to a Web site, make sure the site is secure.

                        Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                        5. Review credit card and other account statements regularly.

                        If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                        6. Keep your operating system and Web browser up to date.

                        To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                        7. Install and run anti-virus software and update it frequently.

                        No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                        8. Run Spyware Protection software regularly.

                        Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                        9. Run firewall software on your computer.

                        A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                        10. Report any phishing scams you receive to the following organizations:

                        Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                        Forward the entire e-mail to the Federal Trade Commission at spam@....
                      • CraftonReunion@yahoogroups.com
                        About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                        Message 11 of 29 , Feb 1, 2014
                        • 0 Attachment
                          About Phishing Scams

                          How Do Phishing Scams Work?

                          Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                          -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                          Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                          If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                          How to Recognize and Avoid Phishing Scams

                          1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                          Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                          2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                          Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                          If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                          3. Be extremely careful if you share personal or financial information online.

                          Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                          4. If you submit information to a Web site, make sure the site is secure.

                          Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                          5. Review credit card and other account statements regularly.

                          If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                          6. Keep your operating system and Web browser up to date.

                          To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                          7. Install and run anti-virus software and update it frequently.

                          No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                          8. Run Spyware Protection software regularly.

                          Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                          9. Run firewall software on your computer.

                          A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                          10. Report any phishing scams you receive to the following organizations:

                          Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                          Forward the entire e-mail to the Federal Trade Commission at spam@....
                        • CraftonReunion@yahoogroups.com
                          About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                          Message 12 of 29 , Mar 1, 2014
                          • 0 Attachment
                            About Phishing Scams

                            How Do Phishing Scams Work?

                            Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                            -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                            Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                            If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                            How to Recognize and Avoid Phishing Scams

                            1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                            Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                            2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                            Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                            If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                            3. Be extremely careful if you share personal or financial information online.

                            Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                            4. If you submit information to a Web site, make sure the site is secure.

                            Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                            5. Review credit card and other account statements regularly.

                            If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                            6. Keep your operating system and Web browser up to date.

                            To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                            7. Install and run anti-virus software and update it frequently.

                            No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                            8. Run Spyware Protection software regularly.

                            Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                            9. Run firewall software on your computer.

                            A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                            10. Report any phishing scams you receive to the following organizations:

                            Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                            Forward the entire e-mail to the Federal Trade Commission at spam@....
                          • CraftonReunion@yahoogroups.com
                            About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                            Message 13 of 29 , Apr 1, 2014
                            • 0 Attachment
                              About Phishing Scams

                              How Do Phishing Scams Work?

                              Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                              -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                              Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                              If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                              How to Recognize and Avoid Phishing Scams

                              1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                              Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                              2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                              Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                              If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                              3. Be extremely careful if you share personal or financial information online.

                              Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                              4. If you submit information to a Web site, make sure the site is secure.

                              Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                              5. Review credit card and other account statements regularly.

                              If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                              6. Keep your operating system and Web browser up to date.

                              To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                              7. Install and run anti-virus software and update it frequently.

                              No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                              8. Run Spyware Protection software regularly.

                              Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                              9. Run firewall software on your computer.

                              A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                              10. Report any phishing scams you receive to the following organizations:

                              Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                              Forward the entire e-mail to the Federal Trade Commission at spam@....
                            • CraftonReunion@yahoogroups.com
                              About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                              Message 14 of 29 , May 1 8:28 AM
                              • 0 Attachment
                                About Phishing Scams

                                How Do Phishing Scams Work?

                                Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                How to Recognize and Avoid Phishing Scams

                                1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                3. Be extremely careful if you share personal or financial information online.

                                Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                4. If you submit information to a Web site, make sure the site is secure.

                                Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                5. Review credit card and other account statements regularly.

                                If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                6. Keep your operating system and Web browser up to date.

                                To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                7. Install and run anti-virus software and update it frequently.

                                No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                8. Run Spyware Protection software regularly.

                                Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                9. Run firewall software on your computer.

                                A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                10. Report any phishing scams you receive to the following organizations:

                                Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                Forward the entire e-mail to the Federal Trade Commission at spam@....
                              • CraftonReunion@yahoogroups.com
                                About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                Message 15 of 29 , Jun 1, 2014
                                • 0 Attachment
                                  About Phishing Scams

                                  How Do Phishing Scams Work?

                                  Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                  -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                  Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                  If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                  How to Recognize and Avoid Phishing Scams

                                  1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                  Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                  2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                  Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                  If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                  3. Be extremely careful if you share personal or financial information online.

                                  Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                  4. If you submit information to a Web site, make sure the site is secure.

                                  Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                  5. Review credit card and other account statements regularly.

                                  If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                  6. Keep your operating system and Web browser up to date.

                                  To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                  7. Install and run anti-virus software and update it frequently.

                                  No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                  8. Run Spyware Protection software regularly.

                                  Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                  9. Run firewall software on your computer.

                                  A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                  10. Report any phishing scams you receive to the following organizations:

                                  Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                  Forward the entire e-mail to the Federal Trade Commission at spam@....
                                • CraftonReunion@yahoogroups.com
                                  About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                  Message 16 of 29 , Jul 1, 2014
                                  • 0 Attachment
                                    About Phishing Scams

                                    How Do Phishing Scams Work?

                                    Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                    -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                    Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                    If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                    How to Recognize and Avoid Phishing Scams

                                    1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                    Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                    2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                    Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                    If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                    3. Be extremely careful if you share personal or financial information online.

                                    Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                    4. If you submit information to a Web site, make sure the site is secure.

                                    Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                    5. Review credit card and other account statements regularly.

                                    If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                    6. Keep your operating system and Web browser up to date.

                                    To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                    7. Install and run anti-virus software and update it frequently.

                                    No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                    8. Run Spyware Protection software regularly.

                                    Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                    9. Run firewall software on your computer.

                                    A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                    10. Report any phishing scams you receive to the following organizations:

                                    Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                    Forward the entire e-mail to the Federal Trade Commission at spam@....
                                  • CraftonReunion@yahoogroups.com
                                    About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                    Message 17 of 29 , Aug 1, 2014
                                    • 0 Attachment
                                      About Phishing Scams

                                      How Do Phishing Scams Work?

                                      Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                      -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                      Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                      If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                      How to Recognize and Avoid Phishing Scams

                                      1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                      Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                      2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                      Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                      If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                      3. Be extremely careful if you share personal or financial information online.

                                      Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                      4. If you submit information to a Web site, make sure the site is secure.

                                      Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                      5. Review credit card and other account statements regularly.

                                      If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                      6. Keep your operating system and Web browser up to date.

                                      To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                      7. Install and run anti-virus software and update it frequently.

                                      No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                      8. Run Spyware Protection software regularly.

                                      Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                      9. Run firewall software on your computer.

                                      A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                      10. Report any phishing scams you receive to the following organizations:

                                      Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                      Forward the entire e-mail to the Federal Trade Commission at spam@....
                                    • CraftonReunion@yahoogroups.com
                                      About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                      Message 18 of 29 , Sep 1, 2014
                                      • 0 Attachment
                                        About Phishing Scams

                                        How Do Phishing Scams Work?

                                        Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                        -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                        Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                        If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                        How to Recognize and Avoid Phishing Scams

                                        1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                        Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                        2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                        Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                        If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                        3. Be extremely careful if you share personal or financial information online.

                                        Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                        4. If you submit information to a Web site, make sure the site is secure.

                                        Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                        5. Review credit card and other account statements regularly.

                                        If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                        6. Keep your operating system and Web browser up to date.

                                        To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                        7. Install and run anti-virus software and update it frequently.

                                        No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                        8. Run Spyware Protection software regularly.

                                        Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                        9. Run firewall software on your computer.

                                        A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                        10. Report any phishing scams you receive to the following organizations:

                                        Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                        Forward the entire e-mail to the Federal Trade Commission at spam@....
                                      • CraftonReunion@yahoogroups.com
                                        About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                        Message 19 of 29 , Oct 1, 2014
                                        • 0 Attachment
                                          About Phishing Scams

                                          How Do Phishing Scams Work?

                                          Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                          -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                          Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                          If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                          How to Recognize and Avoid Phishing Scams

                                          1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                          Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                          2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                          Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                          If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                          3. Be extremely careful if you share personal or financial information online.

                                          Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                          4. If you submit information to a Web site, make sure the site is secure.

                                          Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                          5. Review credit card and other account statements regularly.

                                          If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                          6. Keep your operating system and Web browser up to date.

                                          To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                          7. Install and run anti-virus software and update it frequently.

                                          No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                          8. Run Spyware Protection software regularly.

                                          Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                          9. Run firewall software on your computer.

                                          A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                          10. Report any phishing scams you receive to the following organizations:

                                          Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                          Forward the entire e-mail to the Federal Trade Commission at spam@....
                                        • CraftonReunion@yahoogroups.com
                                          About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                          Message 20 of 29 , Nov 1, 2014
                                          • 0 Attachment
                                            About Phishing Scams

                                            How Do Phishing Scams Work?

                                            Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                            -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                            Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                            If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                            How to Recognize and Avoid Phishing Scams

                                            1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                            Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                            2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                            Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                            If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                            3. Be extremely careful if you share personal or financial information online.

                                            Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                            4. If you submit information to a Web site, make sure the site is secure.

                                            Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                            5. Review credit card and other account statements regularly.

                                            If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                            6. Keep your operating system and Web browser up to date.

                                            To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                            7. Install and run anti-virus software and update it frequently.

                                            No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                            8. Run Spyware Protection software regularly.

                                            Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                            9. Run firewall software on your computer.

                                            A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                            10. Report any phishing scams you receive to the following organizations:

                                            Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                            Forward the entire e-mail to the Federal Trade Commission at spam@....
                                          • CraftonReunion@yahoogroups.com
                                            About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                            Message 21 of 29 , Dec 1, 2014
                                            • 0 Attachment
                                              About Phishing Scams

                                              How Do Phishing Scams Work?

                                              Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                              -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                              Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                              If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                              How to Recognize and Avoid Phishing Scams

                                              1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                              Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                              2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                              Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                              If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                              3. Be extremely careful if you share personal or financial information online.

                                              Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                              4. If you submit information to a Web site, make sure the site is secure.

                                              Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                              5. Review credit card and other account statements regularly.

                                              If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                              6. Keep your operating system and Web browser up to date.

                                              To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                              7. Install and run anti-virus software and update it frequently.

                                              No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                              8. Run Spyware Protection software regularly.

                                              Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                              9. Run firewall software on your computer.

                                              A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                              10. Report any phishing scams you receive to the following organizations:

                                              Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                              Forward the entire e-mail to the Federal Trade Commission at spam@....
                                            • CraftonReunion@yahoogroups.com
                                              About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                              Message 22 of 29 , Jan 1
                                              • 0 Attachment
                                                About Phishing Scams

                                                How Do Phishing Scams Work?

                                                Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                                -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                                Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                                If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                                How to Recognize and Avoid Phishing Scams

                                                1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                                Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                                2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                                Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                                If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                                3. Be extremely careful if you share personal or financial information online.

                                                Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                                4. If you submit information to a Web site, make sure the site is secure.

                                                Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                                5. Review credit card and other account statements regularly.

                                                If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                                6. Keep your operating system and Web browser up to date.

                                                To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                                7. Install and run anti-virus software and update it frequently.

                                                No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                                8. Run Spyware Protection software regularly.

                                                Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                                9. Run firewall software on your computer.

                                                A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                                10. Report any phishing scams you receive to the following organizations:

                                                Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                                Forward the entire e-mail to the Federal Trade Commission at spam@....
                                              • CraftonReunion@yahoogroups.com
                                                About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                                Message 23 of 29 , Feb 1
                                                • 0 Attachment
                                                  About Phishing Scams

                                                  How Do Phishing Scams Work?

                                                  Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                                  -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                                  Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                                  If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                                  How to Recognize and Avoid Phishing Scams

                                                  1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                                  Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                                  2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                                  Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                                  If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                                  3. Be extremely careful if you share personal or financial information online.

                                                  Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                                  4. If you submit information to a Web site, make sure the site is secure.

                                                  Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                                  5. Review credit card and other account statements regularly.

                                                  If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                                  6. Keep your operating system and Web browser up to date.

                                                  To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                                  7. Install and run anti-virus software and update it frequently.

                                                  No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                                  8. Run Spyware Protection software regularly.

                                                  Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                                  9. Run firewall software on your computer.

                                                  A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                                  10. Report any phishing scams you receive to the following organizations:

                                                  Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                                  Forward the entire e-mail to the Federal Trade Commission at spam@....
                                                • CraftonReunion@yahoogroups.com
                                                  About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                                  Message 24 of 29 , Mar 1
                                                  • 0 Attachment
                                                    About Phishing Scams

                                                    How Do Phishing Scams Work?

                                                    Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                                    -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                                    Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                                    If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                                    How to Recognize and Avoid Phishing Scams

                                                    1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                                    Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                                    2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                                    Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                                    If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                                    3. Be extremely careful if you share personal or financial information online.

                                                    Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                                    4. If you submit information to a Web site, make sure the site is secure.

                                                    Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                                    5. Review credit card and other account statements regularly.

                                                    If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                                    6. Keep your operating system and Web browser up to date.

                                                    To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                                    7. Install and run anti-virus software and update it frequently.

                                                    No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                                    8. Run Spyware Protection software regularly.

                                                    Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                                    9. Run firewall software on your computer.

                                                    A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                                    10. Report any phishing scams you receive to the following organizations:

                                                    Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                                    Forward the entire e-mail to the Federal Trade Commission at spam@....
                                                  • CraftonReunion@yahoogroups.com
                                                    About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                                    Message 25 of 29 , Apr 1
                                                    • 0 Attachment
                                                      About Phishing Scams

                                                      How Do Phishing Scams Work?

                                                      Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                                      -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                                      Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                                      If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                                      How to Recognize and Avoid Phishing Scams

                                                      1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                                      Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                                      2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                                      Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                                      If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                                      3. Be extremely careful if you share personal or financial information online.

                                                      Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                                      4. If you submit information to a Web site, make sure the site is secure.

                                                      Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                                      5. Review credit card and other account statements regularly.

                                                      If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                                      6. Keep your operating system and Web browser up to date.

                                                      To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                                      7. Install and run anti-virus software and update it frequently.

                                                      No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                                      8. Run Spyware Protection software regularly.

                                                      Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                                      9. Run firewall software on your computer.

                                                      A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                                      10. Report any phishing scams you receive to the following organizations:

                                                      Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                                      Forward the entire e-mail to the Federal Trade Commission at spam@....
                                                    • CraftonReunion@yahoogroups.com
                                                      About Phishing Scams How Do Phishing Scams Work? Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window
                                                      Message 26 of 29 , May 1 9:08 AM
                                                      • 0 Attachment
                                                        About Phishing Scams

                                                        How Do Phishing Scams Work?

                                                        Phishing scams may take many forms, but they usually start with an e-mail, instant message or pop-up window asking you to update your personal information. One of the following often accompanies this request:

                                                        -- A threat or warning that failure to update your information will result in the closure of an account or cancellation of a subscription -- An offer of a prize or some other form of financial compensation -- A note that you have received pictures or an instant greeting -- A confirmation of an online purchase Phishing attempts may masquerade as official notifications from reputable companies, such as your bank or your credit card company. The message will usually encourage you to click on a link that takes you to a "copycat" Web site designed to look identical to a legitimate site. Such copycat sites are also known as "spoofed" sites.

                                                        Once at the spoofed site, you may be asked to enter your screen name or username and password, your credit card number and expiration date, your Social Security number, or other personal information. Entering this information can give the phisher access to your account to send spam, steal your identity, make fraudulent purchases or otherwise use your identity.

                                                        If you believe you have given away your billing information: First, notify the bank or other business that holds your account. Then visit the FTC's National Resource for Identity Theft Web site at http://www.consumer.gov/idtheft/.

                                                        How to Recognize and Avoid Phishing Scams

                                                        1. Be suspicious of any e-mail or other message containing an urgent request for your personal information.

                                                        Phishing scams typically include upsetting or exciting (but false) statements to encourage victims to act immediately. They typically ask for information like AOL screen names or other usernames and passwords, credit card numbers, Social Security numbers and more.

                                                        2. Even if you think a request for information may be legitimate, don't click the links in the e-mail to visit a Web site.

                                                        Sometimes links can be disguised to look like they're taking you to a real site, when they're actually taking you to a scam site. Instead of clicking a link, type the Web site's address by hand to ensure that you go to the company or organization's real site.

                                                        If the request for information is coming from a company or organization with whom you have a relationship, call them directly to confirm whether they actually need the information and, if so, whether you can provide it over the telephone.

                                                        3. Be extremely careful if you share personal or financial information online.

                                                        Providing this information via Web site is acceptable only if you are certain that the site is legitimate, and the site is secured (see below for additional info).

                                                        4. If you submit information to a Web site, make sure the site is secure.

                                                        Look for the "lock" icon on the status bar at the bottom of your browser window. The lock icon typically appears in the lower right-hand corner of the browser window. In addition, check the beginning of the URL or Web address - if it starts with "https://," rather than just "http://," you're on a secure server.

                                                        5. Review credit card and other account statements regularly.

                                                        If you see anything suspicious, contact your banks and all your credit card issuers immediately. If your statement is late by more than two or three days, call your credit card company or bank to confirm your billing address and account balances.

                                                        6. Keep your operating system and Web browser up to date.

                                                        To update your Windows� operating system and your Internet Explorer� browser, go to windowsupdate.microsoft.com. Follow the instructions there to check for updates, then download and install any critical updates.

                                                        7. Install and run anti-virus software and update it frequently.

                                                        No matter which anti-virus program you use, make sure you keep it up-to-date, or it will provide less and less protection over time. Instructions for updating your software should be included in your program's manual or help area. You can also check the program manufacturer's Web site for instructions.

                                                        8. Run Spyware Protection software regularly.

                                                        Free Spyware (Spybot S&D) is available at http://www.safer-networking.org/en/home/index.html

                                                        9. Run firewall software on your computer.

                                                        A firewall is your computer's first line of defense against harmful attacks from the Internet. If you have a broadband connection, use firewall software to hide your computer from hackers and help protect it from destructive computer trojans and worms.

                                                        10. Report any phishing scams you receive to the following organizations:

                                                        Forward the scam e-mail to the company featured in the e-mail if it is a legitimate company.

                                                        Forward the entire e-mail to the Federal Trade Commission at spam@....
                                                      Your message has been successfully submitted and would be delivered to recipients shortly.