Browse By

Category Archives: Internet Security

Security Warning email from Google

Yesterday I received a “Security Warning” email supposedly from Google and I must say that if I didn’t know better, I would have been the next victim of this phishing scam. Here’s a copy of the email.

Identity theft company’s TV ad backfires

In the TV ads promoting his company’s service, the CEO of an identity fraud prevention agency in the US brandished his Social Security Number and dared everyone to try to steal his identity. Now, he himself has become a victim of identity theft. (Sample TV

More phishing emails from fake PayPal and eBay

Here are some more examples of phishing emails, this time supposedly sent by PayPal and eBay. It is our hope that our series on Phishing Emails will help you easily identify a fake email from the real one. So next time you see a phishing

Phishing scam email from fake UNICEF

We hope that our series on Phishing Emails have helped you identify fake emails and prevented you from becoming one of their victims. You probably know by now that phishing emails, also known as fake or spoof emails, are used to direct recipients to a

Phishing email, fake website:

In the tradition of fake Paypal, eGold, E*Trade, Gmail, and YouTube emails designed to steal your personal information, here comes another phishing email that attempts to deceive you into logging to a fake website so it can hack your e-Bullion funds. The well-designed email comes

Bonjour! C’est un PayPal phishing l’email

Pardon my French (literally), but a few minutes ago I received an interesting email supposedly from PayPal France. The polyglot that I am (not!), I had to get help from a Language Translation site in order to decipher the message and, as expected, it is

Yahoo! Messenger (YM) cellphone load scammer

Beware of scammers who use Yahoo! Messenger (YM) to lure victims to invest in a fake prepaid load business. If the potential victim decides not to join the “venture,” the scammer then attempts to hack that person’s Yahoo account. Here’s how the modus operandi works.