Copyright © 2010 CYBERsitter LLC / Solid Oak Software Protecting Kids and Families for 15 Years CYBERsitter Tips for Protecting Against Fraud and Identity Theft Phishing is a term that is used to describe emails that are carefully crafted to try and trick you into thinking they are from some legitimate business when they are not. It is by far the easiest way for thieves to steal your money or your identity. Phishing messages will look like a legitimate email from a financial institution, on-line store, sites like eBay, or basically any company where the exchange of money might be involved. Maybe you've received an email before from a bank you never heard of asking you to confirm personal details and wondered why you received it. That was a phishing attempt. Phishing is successful only when the criminal succeeds getting your personal information. To do that, they need you to click on a link in their email and get you to visit a fake phishing web site where they will display a legitimate looking web form asking for specific personal information, account numbers, passwords, etc. Now, any legitimate site that asks you for personal or account information will always be a secure site. To make a site secure, a web site must have a special digital certificate issued by a certificate authority . The certificate authority thouroughly verifies the legitimacy of the web site and web site owner so you can be assured of the safety of your private information. Phishing and malicious web sites will not have certificates and will not be secure. That will help us identify the bad guys. CYBERsitter has some powerful features that we use to build our filters. While they can sometimes be very complex, they are also something that every CYBERsitter user will probably want to use to help protect themselves against fraud. All you need to do is add a line or two to your "Always Blocked Sites" list in CYBERsitter. So that you don’t have to become a programmer to use CYBERsitters more advanced capabilities, we are including some examples below. Just “copy” these from this page and “paste” them into your "Always Blocked Sites" list. If you have trouble copying and pasting, try opening this page in Microsoft Internet Explorer. Examples: Note: Each line will always begin with a capital U (User defined) followed by a space and each example must be on a separate single line in your "Always Blocked Sites" list even though it may be word wrapped here. The following line will protect you from accidentally submitting a credit card number to a scam site. This also works with any legitimate credit card number. There is no need to actually enter your own personal number. U (?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14}|6(?:011|5[0-9][0-9])[0-9]{12}|3[47][0-9]{13}|3(?:0[0-5]|[68][0-9])[0- 9]{11}|(?:2131|1800|35\d{3})\d{11})$ The following line will keep a bank account or other account number from being sent to a scam site. In this example, you will need to replace the “x’s” with your actual account number. You can add as many of these to your Always Blocked Site list as you want. U \bxxxxxxxxxxxx The following line will block any form of any valid North American telephone number being transmitted. There is no need to actually enter your own personal number. U \(?\b[0-9]{3}\)?[-. ]?.{0,3}[0-9]{3}[-. ]?[0-9]{4}\b The following line will block any Social Security Number when entered in the format xxx-xx-xxxx. There is no need to actually enter your own Social Security number. U \b[0-9]{3}-[0-9]{2}-[0-9]{4}\b   The following line will block a date (such as a birth date) from being transmitted in the common American format of mm- dd-yy or mm-dd-yyyy. There is no need to actually enter a specific date. U \b(0?[1-9]|1[012])[- /.](0?[1-9]|[12][0-9]|3[01])[- /.](19|20)?[0-9]{2}\b Note: None of these examples will block you from sending information when visiting a legitimate site using a verified digital security certificate. So your normal day to day on-line shopping and financial activities will not be interfered with.  CYBERsitter can be “programmed” to look for and block almost anything and we are particularly interested in hearing ideas from our users, especially if you have ever been the victim of a phishing scam, on-line theft, or identity theft. This will help us create more examples like the ones above that will help everyone. Feel free to drop us a note any time using the contact form on the main CYBERsitter web site. The contact form is available here. CYBERsitter Main Web Site Enter your filter patterns as shown above. They must be exactly the same as the examples and one per line.