{"id":15020,"date":"2018-05-28T13:47:47","date_gmt":"2018-05-28T17:47:47","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=15020"},"modified":"2018-05-28T13:47:47","modified_gmt":"2018-05-28T17:47:47","slug":"phight-phishing-with-this-cloudeight-site-pick","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/phight-phishing-with-this-cloudeight-site-pick\/","title":{"rendered":"Phight Phishing With This Cloudeight Site Pick"},"content":{"rendered":"<h1>Phight Phishing With This Cloudeight Site Pick<\/h1>\n<p>There is no doubt that phishing is one of the most devious yet common ways that criminals and miscreants steal identities, credit card numbers, bank account passwords, Social Security numbers and more personal information. Most would guess that hacking is the way most people are ripped off, but that&#8217;s not true. Phishing emails and sites attempt to trick you into voluntarily entering your personal information on a web site that looks exactly like the target site.<\/p>\n<p>If you get an email from American National Bank asking you to change your password for \u201csecurity reasons\u201d and you click a link in that email, you may well end up on a site that looks exactly like American National Bank. But don&#8217;t just a book by its cover. You might be inclined to type in all sorts of personal data, which then goes directly to the criminals\u2019 database. If you should fall for something like this, you could find your credit cards charged, or your back accounts emptied, and perhaps your identity stolen. IF your identity is stolen, you\u2019re in a real mess.<\/p>\n<p>Banks, credit card companies, financial institutions, and other sites that store confidential information never send out emails asking you to click the link and change you password or change anything on your account. They don\u2019t send out emails with the salutation \u201cDear valued customer\u201d or \u201cDear customer\u201d.<\/p>\n<p>All current updated browsers include good anti-phishing protection. Always make sure you&#8217;re using the current version of your favorite browser.<\/p>\n<p>Any time you get an email that asks you to click a link to change your password or asks you to log in and change any account that deals with money or with your Social Security number or other highly personal information&#8230; think before you click. There&#8217;s a 99% chance if you get an email like this that it&#8217;s a phishing email.<\/p>\n<p>Today&#8217;s Cloudeight\u00a0<a href=\"http:\/\/www.phishtank.com\/\">site pick is called PhishTank.<\/a>. PhishTank helps you by letting you check a site and lets you help other by lettign you report a phishing site.\u00a0.<\/p>\n<p>Here\u2019s how PhishTank\u2019s creators describe their site:<\/p>\n<p><em>\u201cPhishTank is a collaborative clearing house for data and information about phishing on the Internet. Also, PhishTank provides an open API for developers and researchers to integrate anti-phishing data into their applications at no charge.\u201d<\/em><\/p>\n<p>Our\u00a0<a href=\"http:\/\/www.phishtank.com\/\">site pick<\/a>\u00a0today is a serious site dealing with a very serious problem \u2013 phishing. It\u2019s another tool that you now have at your disposal to help you learn more about phishing and how to protect yourself and your assets from the criminals and miscreants who seem to be lurking everywhere on the Web these days.<\/p>\n<p>Please take a few moments to\u00a0<span style=\"text-decoration: underline;\"><a href=\"http:\/\/www.phishtank.com\/\">visit our site pick: PhishTank<\/a><\/span>. We think you\u2019ll find it a valuable resource.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phight Phishing With This Cloudeight Site Pick There is no doubt that phishing is one of the most devious yet common ways that criminals and miscreants steal identities, credit card numbers, bank account passwords, Social Security numbers and more personal information. Most would guess that hacking is the way most people are ripped off, but that&#8217;s not true.\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/phight-phishing-with-this-cloudeight-site-pick\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1678,1,1670,1680,1656],"tags":[1339,2410,194,331],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15020"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=15020"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15020\/revisions"}],"predecessor-version":[{"id":15021,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15020\/revisions\/15021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=15020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=15020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=15020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}