* Readers say education required to prevent people from falling victim to online fraudsters Editor’s Note: Sandra Gittlen is taking a short break from the Web Business Newsletters.Recently we discussed the far too frequent occurrences of “phishing,” whereby scam artists distribute spam disguised as messages from legitimate businesses, such as PayPal and Cititbank. The messages ask customers to reconfirm their passwords and credit card details to an executable file attachment or to a bogus Web site, in an effort to harvest personal information for identity theft purposes. Readers wrote in saying that education is key to avoid falling victim to such scams.Reader Adric M. says the old saying “A fool and his money is soon parted” still holds true, but that in the Internet age, the parting happens faster and with less effort.He says online shoppers “will purchase goods and services over the computer from places with no street address, no phone number, no return policy and without checking out the company.” “My answer [is] old-fashion education. Know your source and know who you are dealing with. Use the U.S. Postal Mail, check references and use the telephone! It is harder to run a scam in person than online,” he says.Linda Musthaler, vice president of IT consulting firm Currid & Company, and author of our Technology Executive newsletter, also wrote in to say that education is the answer and called for mass-marketing campaigns on the scale of anti-smoking and anti-drugs. She suggests consumers could pay a small tax to their ISPs to be used for public-education campaigns. “As business and government push us toward e-commerce and ‘everything to the Internet,’ these entities have a responsibility to make sure the user community is informed as well as engaged,” she says. “I see nothing wrong in a denial-of-service attack against those who seek to steal our identities and account numbers. We also need strong federal legislations against spam, viruses, etc., that allow prosecutors to seek stiff penalties against offenders who can be traced and identified.” Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe