Page 130 - digitalliteracy
P. 130
6.2 Remaining Safe and Secure Online
Phishing Scheme
Earlier in this module, we discussed phishing as one of the top five social media scams. Phish-
ing schemes can take place through e-mail, as well. For example, someone may e-mail you and
offer to send you money if you send them a “good faith” deposit first. Or someone may claim to
be from the fraud department of your credit card company and ask you to reply to the e-mail
with some personal information. E-mail antispam filters (discussed later in this module) may
catch e-mail messages coming from phishers. But the U.S. Computer Emergency Readiness
Team says the best way for you to beat phishers at their own game is to be wary and never
give out your personal or financial information online (Brain & Fenlon, 2015).
114
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
sol82612_06_m06_097-120.indd 114 6/29/16 5:14 PM

