{"id":46,"date":"2006-03-15T13:47:11","date_gmt":"2006-03-15T20:47:11","guid":{"rendered":"http:\/\/computertechsreno.com\/tips\/2006\/03\/15\/new-ways-to-phish-for-your-private-information\/"},"modified":"2023-12-18T07:30:32","modified_gmt":"2023-12-18T15:30:32","slug":"new-ways-to-phish-for-your-private-information","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/new-ways-to-phish-for-your-private-information\/","title":{"rendered":"New ways to &#8220;phish&#8221; for your private information"},"content":{"rendered":"<p>According to <a href=\"http:\/\/en.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"noopener\">Wikipedia<\/a> \u201cphishing\u201d is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises from the use of increasingly sophisticated lures to &#8220;fish&#8221; for users&#8217; financial information and passwords. (Click on the Wikipedia link at the beginning of this paragraph for more information including detailed examples claiming to come from eBay or PayPal). I\u2019ve recently come across a new Phishing scheme that causes a window to pop-up on a computer claiming to be from AOL, and requesting information you should never give out on the internet \u2013 such as ATM PIN number. Luckily the customer did the right thing by not filling out the form, called AOL and confirmed that this is a phishing scheme. You can see the official-looking window below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.computertechsreno.com\/newsletter\/images\/aol-pop-up.jpg\" border=\"0\" alt=\"\" width=\"563\" height=\"452\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Wikipedia \u201cphishing\u201d is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises from the use of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,14,4],"tags":[],"class_list":["post-46","post","type-post","status-publish","format-standard","hentry","category-computing-tips","category-passwords","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":3,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/46\/revisions"}],"predecessor-version":[{"id":3914,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/46\/revisions\/3914"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}