Email Palsu Paypal Kembali Beredar

Email palsu mengatasnamakan Paypal kembali beredar. Pengguna Paypal & internet harap berhati-hati bila menerima email semacam ini.

Salah satu email palsu ini mempunyai pola seperti ini:

shiping angel, your PayPal account will be closed on 03/04/2010

Friday, April 2, 2010 10:50 AM
From:
“PayPal” <security@onlineupdate.com>

Dear shiping angel,


We recently reviewed your account, and we are suspecting that your PayPal account may have been accessed from an unauthorized computer.

This may be due to changes in your IP address or location. Protecting the security of your account and of the PayPal network is our primary concern.

We are asking you to immediately login and report any unauthorized withdrawals, and check your account profile to make sure no changes have been made.

To protect your account please follow the instructions below:

* DO NOT SHARE YOUR PASSWORD WITH OTHER USERS

* LOG OFF AFTER USING YOUR ONLINE ACCOUNT

Please click on the following link, to verify your account activity:

http://www.paypal.com/cgi-bin/webscr?cmd=_login-run

We apologize for any inconvenience this may cause, and appreciate your support in helping us maintaining the integrity of the entire PayPal system.

Please login as soon as possible.

Thank you,
PayPal Security Center.

——————————-


Kalau diperhatikan sekilas, link yang diberikan adalah dari paypal, tapi ketika diklik, link akan masuk ke situs: http://cheersandgears.com/waw/ – Oleh karena ini para pengguna internet yang mempunyai account Paypal, apabila menerima email seperti ini, abaikan saja.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: