You have probably seen this word “phishing” in the recent past but may not have known what it meant.  Or you may have even thought that it was misspelled.   While phishing is similar to fishing, the latter is for salmon, while the former is for passwords or other sensitive information.  Generally the phisher sends a message that sounds as if it is coming from an official source and asks you to do respond by going to a webpage and signing in or sharing personal information.  In the past, most phishing happened in email.  But, it today’s world, it might also happen on Facebook.

Your account is reported to have violated a policy that is considered disruptive or insulting Facebook users. Until we http://www.facebook.com/security system will deactivate your account within 12 hours after you open this message if you do not confirm such reproductions.

If you still want to use your account, please confirm your facebook account below:

apps.facebook.com/-security-services/
(If the link is not clickable, try copy it into your browser.)

Note: we recommend to facebook users, asked to filling data that are complete and very accurate because we are from http://www.facebook.com/security team can ensure that the ownership of the account actually exists in your control and no that is using your Facebook account without permission.

This phishing seems to suggest that if you do not log in, you will lose your Facebook account.  Don’t do it!  They are trying to steal your password so they can use your account for nefarious purposes.

What should you look for?  Most often, you will see a link to a third party site.  In this case, rather than http://www.facebook.com, the message sent you to apps.facebook.com, which would be an application within Facebook (this one no longer exists).   Sometimes in email, what it says in the link is not to where the link goes when you click on it.    The page will almost always look VERY official, but you should ignore that!  A second hint is poor grammar.  Notice “we recommend to facebook users, asked to filling data ….” as an example.

What should you do?  In this case, ignore it.  If you are unsure, use normal means for contacting the source (such as emailing or calling the company).  And, check Facecrooks to see if it is a real threat.

Advertisements