Hide Techdirt is off for the long weekend! We'll be back with our regular posts tomorrow.

More Online Scams Target Earthlink, PayPal

from the suckers,-suckers,-everywhere dept

Just a day after reports came out about a “sophisticated” scam to get PayPal users to give up their name, social security number, credit card info, and bank account info was exposed, Earthlink is claiming they’ve stopped a similar scam targeted at their users. While, unlike scams in the past, these scammers are doing a much better job making their emails and websites look official, I’m still curious who actually falls for these things? Anyone sends an email asking for that sort of info and it’s clear that it’s a scam.

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “More Online Scams Target Earthlink, PayPal”

Subscribe: RSS Leave a comment
Lyndon Liberty says:

You are suprized this still works?

You must not watch much TV or talk to those who do… lol the show “Street Smarts” is a good example… I recorded all the questions asked for one week, then bet my friend that I could go out locally and find just as many idiots, he declined the bet because he was afraid he would be proven wrong in his comfortable dillusion. I went out anyway, they must cut 60% of the idiots to get one show….

Michael Ax says:

blaming the victims doesnt cut it dudes

if people didnt like the mileage they got out of these stories we would have browsers that made compliance with the URL authentication part of the HTTP RFC optional.

as is we have you grandstanding and everyone else ‘recording the facts’ while everyday thousands of browsers are installed with slavish conformity to this most expensive and dangerous loophole of them all.

i have written to scores of sites and people – this one included – about this loophole and nobody seems to ‘GET’ that these things would not happen if the browser status bars would properly resolve target urls rather than merely echoing the first part of the string.

this part of ‘the web’ is broken badly from a usability pov and people writing browers like IS/NS/opera need to be told to protect the noob’s by making URL AUTHENTICATION something that defaults to off.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...