P. 1


|Views: 315|Likes:
Publicado porAmer Ismail

More info:

Published by: Amer Ismail on Apr 01, 2011
Direitos Autorais:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Phishing is an Internet Scam designed to trick recipients into revealing their personal p g p information such as : Usernames Passwords Credit cards Social security numbers y .

Phishing is also an example of social engineering techniques used to fool users. Phishing is typically carried out by e-mail or einstant message message. . Facebook. p poor usability of current web security technologies. Myspace. It often directs the users to enter details at fake websites. Friendster or PayPal are commonly used to lure the unsuspecting unsuspecting. and exploits the q .Some porpular websites such as YouTube.


. ( ) The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website. Such mistakes are common in most phishing emails. disguised as an official e-mail eefrom a (fictional) bank.This is an example of a phishing e-mail.

spelling mistakes i hi hi lli i t k in the e-mail and the presence eof an IP address in the link are both clues that this is a phishing attempt.il t t d t PayPal users.Another example of a phishing e-mail targeted at hi hi e. In an example PayPal phishing. .

The phishers may use a person’s details to create person s fake accounts and ruin the victim’s credit.Phishing will lead to substantial financial loss loss. .

A phishing technique was described in 1987. The first recorded mention of the term "phishing" is on the alt.online-service. . 1996.onlineThe print edition of the hacker magazine 2600 was appeared on January 2. alt.

.Attempts to deal with the growing number of reported phishing incidents include : legislation user training public awareness technical security measures.

AntiAnti-phishing Software Computer insecurity Comfidence trick Dancing pigs Defensive computing DomainKeys D i K E-mail spoofing Pharming Rock Phish Kit Social engineering Vishing .

. change it frequently. Protect your computer with a password. Never provide personal information over the phone if you did not initiate the call. To protect yourself you need to stay all the more alert p y y y and knowledgeable.Not to use any links that your phishing email has p provided.

te 2007.com/topic/phishing#Antihttp://www. 2007. Thompson. Di c e i C Vermaat.com/topic/phishing#Antiphishing Shelly Cashman Vermaat Discovering Computers Shell Ca h a Ve aat.answers.wikipedia.org/wiki/Phishing http://www.answers.http://en. 2007 .


You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->