http://www.microsoft.com/athome/security/email/phishing_with_phones.mspx
|
| • |
Treat all unsolicited e-mail (and phone) messages with skepticism and avoid clicking on links. |
| • |
Before you call, research unfamiliar area codes first using legitimate local phone companies to avoid long distance, international, or other toll charges. |
| • |
To determine actual customer support and other phone numbers, check the organization's Web site. And when you do your research, don't follow a link in an e-mail—always type the Web site URL address yourself. |
| • |
If available, refer to your hardcopy records of past invoices or statements for legitimate contact phone numbers and other information. Creditor customer support phone numbers are also often listed on the back of credit cards. |
| • |
Stay current about the latest identity-theft scams through industry-standard security newsletters, security Web sites, and other reliable sources. |
| • |
Scrutinize your e-mail for telltale signs of a phishing attempt, such as poor grammar, typos, strange Web addresses, or anything else that seems suspicious. |
| • |
Report suspicious e-mail to the FBI, the Federal Trade Commission (FTC), and the Anti-Phishing Working Group (APWG). |
-- Danilo
