Phishing is an Internet Scam designed to trick recipients into revealing their personal p g p information such as : Usernames Passwords Credit cards Social security numbers y .

Friendster or PayPal are commonly used to lure the unsuspecting unsuspecting. Phishing is typically carried out by e-mail or einstant message message.Some porpular websites such as YouTube. It often directs the users to enter details at fake websites. Phishing is also an example of social engineering techniques used to fool users. Myspace. p poor usability of current web security technologies. and exploits the q . Facebook. .

.

Such mistakes are common in most phishing emails. disguised as an official e-mail eefrom a (fictional) bank. ( ) The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website. .This is an example of a phishing e-mail.

.Another example of a phishing e-mail targeted at hi hi e.il t t d t PayPal users. In an example PayPal phishing. spelling mistakes i hi hi lli i t k in the e-mail and the presence eof an IP address in the link are both clues that this is a phishing attempt.

The phishers may use a person’s details to create person s fake accounts and ruin the victim’s credit.Phishing will lead to substantial financial loss loss. .

A phishing technique was described in 1987. alt. 1996.onlineThe print edition of the hacker magazine 2600 was appeared on January 2. The first recorded mention of the term "phishing" is on the alt.online-service. .

.Attempts to deal with the growing number of reported phishing incidents include : legislation user training public awareness technical security measures.

AntiAnti-phishing Software Computer insecurity Comfidence trick Dancing pigs Defensive computing DomainKeys D i K E-mail spoofing Pharming Rock Phish Kit Social engineering Vishing .

To protect yourself you need to stay all the more alert p y y y and knowledgeable. .Not to use any links that your phishing email has p provided. Never provide personal information over the phone if you did not initiate the call. Protect your computer with a password. change it frequently.

com/topic/phishing#Antiphishing Shelly Cashman Vermaat Discovering Computers Shell Ca h a Ve aat.answers.org/wiki/Phishing http://www.wikipedia. 2007 .answers. 2007.com/topic/phishing#Antihttp://www. Di c e i C Vermaat. te 2007.http://en. Thompson.

SABRINA LEE NUR IRDINA ZAHIRAH NURUL ZAFIRAH SYARIFAH ALUWIAH .

Sign up to vote on this title
UsefulNot useful