Page 130 - digitalliteracy
P. 130

6.2  Remaining Safe and Secure Online



                       Phishing Scheme

                       Earlier in this module, we discussed phishing as one of the top five social media scams. Phish-
                       ing schemes can take place through e-mail, as well. For example, someone may e-mail you and
                       offer to send you money if you send them a “good faith” deposit first. Or someone may claim to
                       be from the fraud department of your credit card company and ask you to reply to the e-mail
                       with some personal information. E-mail antispam filters (discussed later in this module) may
                       catch e-mail messages coming from phishers. But the U.S. Computer Emergency Readiness
                       Team says the best way for you to beat phishers at their own game is to be wary and never
                       give out your personal or financial information online (Brain & Fenlon, 2015).




































































                                                                 114
                        © 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.



       sol82612_06_m06_097-120.indd   114                                                                            6/29/16   5:14 PM
   125   126   127   128   129   130   131   132   133   134   135