Step 1: Protect your desktop
Keep your system up-to-date. Use automatic updates for fixing security vulnerabilities. Use anti-virus and anti-spyware with live updates. If you know how to use a personal firewall, install one as well. Keep your system settings at a protected level, to disable automatic execution of unknown applications.
Step 2: Use only reputable applications
Many Internet scams might install themselves on your machine as part of legitimate applications. Therefore, before executing or installing new applications make sure that the applications are safe. Never execute an application that was received from unknown entities. If you received an application from someone you know, confirm with the sender that it is safe and it was sent by him and not by others using his address. When an application automatically tries to execute itself and you are asked to confirm, be suspicious and if you are not sure, don't confirm the execution.
Step 3: Protect yourself from submitting personal and confidential information to scammers using CallingID Toolbar
CallingID automatically detects phishing scams in real-time using 54 verification tests. In addition, it automatically provides you with valuable information: who owns the site you visit and is this owner a real organization. When you see that the entity that will receive your data is different than you expected or that there is a potential risk sending information to that site, you should rethink. CallingID provides all the required information for you to decide if it is safe submitting personal and confidential data to a site before the data is submitted.