Page 12 July 5, 2012 June 2012Winner Finance How to Catch a ‘Phish’ By Jason Alderman (“farmed”). Social networking sites Their names may sound funny like Facebook and Twitter increas- but their financial consequences are ingly are being targeted, so always not: “Phishing,” “smishing,” “vish- be wary of opening any links – even ing” and “pharming” are just a few from trusted friends – because their of the ways criminals gain access account may have been hacked. which was published on June 14 and submitted computer or smartphone. If you’re emails and texts:Our Staff Pick for June is “Devin Preston,”to personal information via yourA few tips for spotting risky by Sharon A. Jackson. The winner will receive not careful, identity thieves can use • Although the “From” line may tino’s Pizza with locations in El Segundo and or credit card accounts, take out loans, rent email address, that’s easy for fraudsters to-harvested information to open fraudulent bankappear to be from a valid company a $25 gift certificate from our advertiser Valen Manhattan Beach. apartments or even charge medical procedures mimic (called “spoofing”).• Beware of subject lines and body copyto your insurance plan. Unfortunately, every time the authorities that use ominous or threatening language plug one hole, crafty criminals figure out new (e.g., “Your credit card has been suspended”). ways to trick unsuspecting victims. Here are • Lack of a personalized salutation or clos- some identity theft scams to watch out for: ing details (e.g., “Dear Valued Customer”). Phishing: This is where you receive an • Watch for typos, poor grammar, punc- email, purportedly from a trusted source tuation, capitalization consistency and other like a government agency, bank or retailer warning signs it’s not legitimate. that asks you to supply or confirm account • Scroll your mouse over any embedded information, log-in IDs or passwords. These links before clicking to check for suspicious imposters are “fishing” for your personal in- domain endings like “.be.” formation. Legitimate organizations never ask • Verify that an alert or request for informa- you to verify sensitive information through tion is legitimate by looking up the company’s a non-secure means like email. phone number and calling it yourself. Smishing (for “Short Message Service”): • Make sure your anti-virus and anti-spyware Like phishing, only it uses text messages software is current. Green Dolphins - Big Smiles after a Big sent to your cellphone. Even if you don’t For more tips protecting personal and Sand Soccer game share any information, just by responding account information and preventing online in Santa Monica. you’re verifying that your phone number is fraud, visit: Submitted by Sass valid, which means it probably will be sold • The National Cyber Security Alliance’s Muncey. www.staysafeonline.org.to others who will try to trick you into their own scams. • The FBI’s Be Crime Smart page, which Vishing (voice phishing): Where live or highlights the latest scams and tells you automated callers direct you to call your how to report crime and fraud (www.fbi. bank or credit card issuer under the pretext of gov/scams-safety). clearing up a problem (like theft or overdrawn • Visa Inc. offers VisaSecuritySense.com, accounts). You’ll be asked to share personal which features tips on preventing fraud on- or account information. Keep a list of toll- line, when traveling, at retail establishments free service numbers for all companies you and ATMs, deceptive marketing practices, use so you can call them directly without and more. fearing you’ve been given bogus informa- And finally, don’t forget good-old-fashioned tion. I also program these numbers – but pickpocketing, mail theft and dumpster div- Sophie (dog) and Preston (2 years old). not account numbers – into my cell phone ing as ways people may try to steal your Submitted by Kristen Poulos. in case I’m traveling. personal information. Pharming. Where hackers redirect you Jason Alderman directs Visa’s financial edu- from a legitimate website to an impostor site cation programs. To Follow Jason Alderman Readers send us your where your personal information is harvested on Twitter: www.twitter.com/PracticalMoney. • photos!Do you have a favorite photo? An old yearbook photo? Glamour Shot? Baby photo?We Council from front page want them.We will accept only one photo, per person, every month. Once a month, we will pick a “Staff City Manager Steve Mandoki assured the approved 2012-13 City budget, after concern $25.00 gift certificate from one Council that the assembly of the pool table was voiced during oral communications that theFavorite” and the winner will get a of our advertisers. in the Lawndale Community Center will be approved budget on June 18, 2012 may still completed by a professional company and include monies that are not actually accessible Email your photos to: Management@ access will be available by Monday, July 9. from UDAG funds and that the loans from heraldpublications.com. The use of the pool table will be governed UDAG funds for the Redevelopment Agency We will only accept emailed photos and by new rules approved by the Council to that is no longer in existence pose an issuethey must be in jpg form. include a minimum age of 18 years for use for some citizens. Louie explained that the of the pool table and anyone under the age UDAG funds were allowable for the reasons of 18 to be accompanied by an adult. Also, that were stated during the June 18 budget all players must register their names with the discussions because the amount used was the Community Center Services reception desk cash available, which had been moved to the and leave a form of identification to check general fund, based on the regulations of the out any equipment, including cues, billiard loan of any monies in the UDAG funds being What do you call two people in an ambulance? balls and chalk, all to be returned after the paid back by the Redevelopment Agency-- A pair of medics. maximum 30-minute sessions. The table thus making the UDAG funds accessible to cover must be replaced by the last person the general fund and allowing discretionary or persons using the pool table and play- use by the City. Rudolph was satisfied with A backwards poet writes inverse. ers must be dressed properly with shoes or the explanation, as were the other Council sandals, pants or shorts, and a proper top, members, that the 2012-13 budget had been In democracy your vote counts. with no tank tops allowed. A Community balanced with available funding. In feudalism, your count votes. duty to monitor rule compliance. No sitting appointment of Golden Thrower to the Person-The Council also approved the two-yearServices staff member will always be on or leaning on the pool table will be tolerated. nel Board vacancy, beginning immediately. With her marriage, she got a new name and a dress. Gambling is strictly prohibited. Boisterous A report of relevant information about the behavior or profanity will not be tolerated. Council involvement with the Green Line Pool table use hours will be Monday through Extension Metro Project will be released to Show me a piano falling down a mine shaft, Thursday, 8 a.m. to 5 p.m.; Friday, 8 a.m. to the public via The Lawndalian, the City of and I’ll show you a flat minor. 3 p.m.; Saturday, 10:30 a.m. to 1 p.m. No Lawndale’s self-published newsletter, as soon reservations will be honored to use the pool as a report can be generated and approved table. Rules and regulations for pool table for publication in coordination with the next Every calendar’s days are numbered. use will be posted in the Community Center. newsletter and its publication date. Mayor Pro Tem Larry Rudolph requested The next meeting of the Lawndale City that City Treasurer Ken Louie clarify how the Council will take place on Monday, July 16, UDAG funds were available to balance the 2012 at 6:30 p.m. •
Lawndale 7.5.12
To see the actual publication please follow the link above