{"id":25,"date":"2007-10-01T10:15:26","date_gmt":"2007-10-01T08:15:26","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/10\/01\/learn-about-phishing\/"},"modified":"2007-10-01T10:15:26","modified_gmt":"2007-10-01T08:15:26","slug":"learn-about-phishing","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/","title":{"rendered":"Learn About Phishing"},"content":{"rendered":"<p>Do you know what phishing is? As its name suggests, it&#8217;s a way to &#8220;fish&#8221; for dupes, or people who fall for a scam. Generally, phishing attempts come by e-mail; you know, those messages claiming to be from your bank, or from eBay or PayPal, asking you to log in and update your payment information. In some cases, the &#8220;phishers&#8221; are good; the URLs they use may look real, but what you see is actually masking a different URL, perhaps leading you to a server in China or Russia. <\/p>\n<p>Phishing is all about getting your credit card to steal money from you. It&#8217;s not small-change scamming, but rather organized crime. It&#8217;s mighty effective, too. <a href=\"https:\/\/www.intego.com\/personalAntispam\/\">Intego Personal Antispam<\/a> has built-in filters to protect you from phishing by sorting these e-mails into your spam folder, and <a href=\"https:\/\/www.intego.com\/isbDP\/\">Intego Internet Security Barrier Dual Protection<\/a> offers this type of filtering both for Mac OS X and your Windows installation. <\/p>\n<p>But it&#8217;s a good idea to understand what phishing is, and become savvy enough to spot a phishing URL when you see one. Computer scientists at Carnegie Mellon University have developed a game called <a href=\"http:\/\/cups.cs.cmu.edu\/antiphishing_phil\/\">Anti-Phishing Phil<\/a>, where you can learn exactly how phishing works and how to protect yourself from these bogus web sites.<\/p>\n<p>Remember one cardinal rule: neither your bank, eBay, Amazon or any other company will ever ask you by e-mail to log in to your account and enter your credit card information. In some cases, if your credit card has expired, they may ask you to update your information, but you&#8217;ll know that the card is no longer valid. When in doubt, log in normally (not using a URL you get in an e-mail) and go to your account settings. You can be sure that you&#8217;ll be on the right server that way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what phishing is? As its name suggests, it&#8217;s a way to &#8220;fish&#8221; for dupes, or people who fall for a scam. Generally, phishing attempts come by e-mail; you know, those messages claiming to be from your bank, or from eBay or PayPal, asking you to log in and update your payment information. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Do you know what phishing is? As its name suggests, it&#039;s a way to &quot;fish&quot; for dupes, or people who fall for a scam. Generally, phishing attempts come by\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn About Phishing - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Do you know what phishing is? As its name suggests, it&#039;s a way to &quot;fish&quot; for dupes, or people who fall for a scam. Generally, phishing attempts come by\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-01T08:15:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/\",\"name\":\"Learn About Phishing - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-10-01T08:15:26+00:00\",\"dateModified\":\"2007-10-01T08:15:26+00:00\",\"description\":\"Do you know what phishing is? As its name suggests, it's a way to \\\"fish\\\" for dupes, or people who fall for a scam. Generally, phishing attempts come by\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn About Phishing\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Learn About Phishing\",\"datePublished\":\"2007-10-01T08:15:26+00:00\",\"dateModified\":\"2007-10-01T08:15:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage\"},\"wordCount\":303,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Do you know what phishing is? As its name suggests, it's a way to \"fish\" for dupes, or people who fall for a scam. Generally, phishing attempts come by","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Learn About Phishing - The Mac Security Blog","og_description":"Do you know what phishing is? As its name suggests, it's a way to \"fish\" for dupes, or people who fall for a scam. Generally, phishing attempts come by","og_url":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-10-01T08:15:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/","name":"Learn About Phishing - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-10-01T08:15:26+00:00","dateModified":"2007-10-01T08:15:26+00:00","description":"Do you know what phishing is? As its name suggests, it's a way to \"fish\" for dupes, or people who fall for a scam. Generally, phishing attempts come by","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Learn About Phishing"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Learn About Phishing","datePublished":"2007-10-01T08:15:26+00:00","dateModified":"2007-10-01T08:15:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-phishing\/#webpage"},"wordCount":303,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}