Here are some tips from an Internet service provider, eBay, and Citibank on ways to avoid being phished.
Citibank warns its customers to check the security certificate for any site to which they're linked.
If the name doesn't match the company owning the site, you shouldn't trust the link. It also recognizes that not all certificates are held in a name recognized by consumers accessing the site, but the bank informs its customers that all security certificates for Citibank's sites are held in its "Citibank" name.
Since not all security certificate issuers police similar-sounding "brand-related" names when issuing their certificates, knowing the exact name of the security-certificate holder is key to authenticating the page. All sites should disclose the correct security-certificate holder name at their sites.
EBay teaches its members how to spot a fake eBay URL by checking the browser Web-address window. (Although, given the Microsoft Internet Explorer vulnerability that permits the URL appearance in the browser window to be spoofed, this tip may be ineffective for IE users.)
Here's how to be sure you're on an eBay page: Before signing in, check the Web address in your browser. If you click on a link in an E-mail, verify that the Web address in your browser is the same as the address shown in the E-mail.
The Web address of most eBay sign-in pages begins with http://signin.ebay.com/. Never type your eBay user ID and password into a Web page that doesn't have ".ebay.com" immediately before the first forward slash (/)."
Examples of real eBay addresses:
Examples of fake eBay addresses:
Advice From Those In The Field
I sought the assistance of members of the Internet Society's IETF list in trying to come up with better tips on avoiding phishing and spoofing schemes.
Dean Anderson, who owns and runs an ISP in Boston, explained the basics best, so I want to share his tips with you.
EBay, the FTC, Citibank, and consumer-advocacy groups advise to make sure you're using a secure server connection. Dean comments on the wisdom of that tip and holes that can be exploited by the con artists.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.