Health & Safety

May 17, 2012

No more Phishing Scams

David Ager
Post Office Clerk in Charge

Examples of Phishing Messages

You open an email or text, and see a message like this:

“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”

“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”

“Our records indicate that your account was overcharged. You must call us within 7 days to receive your refund.”

The senders are phishing for your information so they can use it to commit fraud.

How to Deal with Phishing Scams

  • Delete email and text messages that ask you to confirm or provide personal information (credit card and bank account numbers, Social Security numbers, passwords, etc.). Legitimate companies don’t ask for this information via email or text.
  • The messages may appear to be from organizations you do business with – banks, for example. They might threaten to close your account or take other action if you don’t respond.
  • Don’t reply, and don’t click on links or call phone numbers provided in the message, either. These messages direct you to spoof sites – sites that look real but whose purpose is to steal your information so a scammer can run up bills or commit crimes in your name.
  • Area codes can mislead, too. Some scammers ask you to call a phone number to update your account or access a “refund.” But a local area code doesn’t guarantee that the caller is local.
  • If you’re concerned about your account or need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card.

Action Steps

You can take steps to avoid a phishing attack:

  • Use trusted security software and set it to update automatically. In addition, use these computer security practices.
  • Don’t email personal or financial information. Email is not a secure method of transmitting personal information.
  • Only provide personal or financial information through an organization’s website if you typed in the web address yourself and you see signals that the site is secure, like a URL that begins https (the “s” stands for secure). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call to confirm your billing address and account balances.
  • Be cautious about opening attachments and downloading files from emails, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer’s security.



All of this week's top headlines to your email every Friday.


 
 

 
sterling-yuma

Sterling Global Operations completes U.S. Navy project to clear munitions, firing range and target debris from Arizona Marine Corps Air Station range

Sterling Global Operations, Inc., in a two-year project for the U.S. Navy, removed or recycled some 5.9 million pounds of munitions, firing range and target debris from Marine Corps Air Station at Yuma, Ariz. Sterling Global re...
 
 

US Army, Raytheon achieve first inflight lethal intercept of low quadrant elevation rocket

YUMA PROVING GROUND, Ariz. – Raytheon successfully intercepted and destroyed a low quadrant elevation 107mm rocket as part of the second series of guided test vehicle flight tests of the Accelerated Improved Intercept Initiative program. The intercept is a major test milestone before the U.S. Army live-fire engagements begin in September. “Beginning only 18 months...
 
 

Raytheon, U.S. Army complete first AI3 guided flight test series

Raytheon and the U.S. Army successfully completed the first guided test vehicle flight series of the Accelerated Improved Intercept Initiative program at Yuma Proving Ground, Aris. The series consisted of two flight tests against different target profiles. In each case after launch, the interceptor initially guided on in-flight radio frequency datalink updates from the fire...
 

 

New Navy vessel named after Yuma

The U.S. Navy has decided to name one of their newest Joint High-Speed Vessels after the city of Yuma, Ariz., forming an even deeper bond between the local community and our military. Political officials from the state of Arizona and the city of Yuma were informed of the decision by the Honorable Ray Mabus, Secretary...
 
 
DoD

Joint Strike Fighter on track, costs coming down, Kendall says

Indications are that the F-35 joint strike fighter program — the most expensive aviation program in Defense Department history — is on track, the undersecretary of defense for acquisition, technology and logistics told a Senate panel June 19. Testifying before the Senate Appropriations Committee’s defense subcommittee this morning, Frank Kendall said the F-35 will be...
 
 
DoD
WEBarmy-jltv2

Joint Light Tactical Vehicle ‘closes capability gap,’ Army says

While the Humvee has served the Army well for some 25 years, there’s a “capability gap” in what it can do for warfighters on a 21st-century battlefield, said the Soldier responsible for overseeing its replacem...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin