P. 1
phishing

phishing

|Views: 315|Likes:
Publicado porAmer Ismail

More info:

Published by: Amer Ismail on Apr 01, 2011
Direitos Autorais:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/16/2015

pdf

text

original

Phishing is an Internet Scam designed to trick recipients into revealing their personal p g p information such as : Usernames Passwords Credit cards Social security numbers y .

Friendster or PayPal are commonly used to lure the unsuspecting unsuspecting. and exploits the q . Phishing is also an example of social engineering techniques used to fool users. Phishing is typically carried out by e-mail or einstant message message. p poor usability of current web security technologies. It often directs the users to enter details at fake websites. Facebook. Myspace. .Some porpular websites such as YouTube.

.

disguised as an official e-mail eefrom a (fictional) bank.This is an example of a phishing e-mail. Such mistakes are common in most phishing emails. . ( ) The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website.

. spelling mistakes i hi hi lli i t k in the e-mail and the presence eof an IP address in the link are both clues that this is a phishing attempt. In an example PayPal phishing.Another example of a phishing e-mail targeted at hi hi e.il t t d t PayPal users.

Phishing will lead to substantial financial loss loss. The phishers may use a person’s details to create person s fake accounts and ruin the victim’s credit. .

A phishing technique was described in 1987. 1996.online-service. . alt.onlineThe print edition of the hacker magazine 2600 was appeared on January 2. The first recorded mention of the term "phishing" is on the alt.

Attempts to deal with the growing number of reported phishing incidents include : legislation user training public awareness technical security measures. .

AntiAnti-phishing Software Computer insecurity Comfidence trick Dancing pigs Defensive computing DomainKeys D i K E-mail spoofing Pharming Rock Phish Kit Social engineering Vishing .

Not to use any links that your phishing email has p provided. Protect your computer with a password. change it frequently. To protect yourself you need to stay all the more alert p y y y and knowledgeable. . Never provide personal information over the phone if you did not initiate the call.

answers. Thompson.answers.http://en.wikipedia.com/topic/phishing#Antiphishing Shelly Cashman Vermaat Discovering Computers Shell Ca h a Ve aat.com/topic/phishing#Antihttp://www. te 2007. 2007. 2007 .org/wiki/Phishing http://www. Di c e i C Vermaat.

SABRINA LEE NUR IRDINA ZAHIRAH NURUL ZAFIRAH SYARIFAH ALUWIAH .

You're Reading a Free Preview

Descarregar
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->