Furtherance to the email I received from Anthony Lammert, I just would like to elaborate a little bit of what he meant by “Only an artful 'IT savy tech’ person would be able to circumscribe 'through the back door' to obtain such data!” The technique used to obtain data from the back door is called phishing or key logger. For the benefit of readers who are not familiar with the terminology, I have the pleasure to provide a little bit of information on E-mail Hijacking / Friend Scams as what happened to our unfortunate friend a couple of days ago.
Some fraudsters hijack existing e-mail accounts and use them for advance fee fraud purposes. The fraudsters e-mail associates, friends, and/or family members of the legitimate account owner in an attempt to defraud them. This ruse generally requires the use of phishing or keylogger computer viruses to gain login information for the e-mail address.
Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait
Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs) , social security numbers, banking numbers, and passwords. This information was used for identity theft.
A phishing technique was described in detail as early as 1987, while the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated baits used in the hope of a "catch" of financial information and passwords. The word may also be linked to leetspeak in which ph is a common substitution for f. Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term "whaling," has been coined for these kinds of attacks
The readers are advised to be suspicious of any official-looking e-mail message that asks for updates on personal or financial information and urges recipients to go directly to the organization's Web site to find out whether the request is legitimate.
Truly Kadayan/Kedayan by birth. Residing in Subang Jaya, Selangor D.E. since 1988 until now.
I was born in the Colony of North Borneo, now called Sabah (Land Below the Wind). It was still the British rule then, and we used to sing "God Save the Queen" at the school assembly in early sixties. On 16 September, 1963, the Colony of North Borneo gained its independence through the formation of Malaysia.
I spent most of my childhood days in a remote village, where basic utilities such as roads, water, electricity and telephones were not known to the village folks.
My childhood days were very challenging, simply because our living condition was just at the lowest level of Maslow Hierarchy of Needs.