This action might not be possible to undo. Are you sure you want to continue?
Phishing is an Internet Scam designed to trick recipients into revealing their personal p g p information such as : Usernames Passwords Credit cards Social security numbers y .
Some porpular websites such as YouTube. Phishing is also an example of social engineering techniques used to fool users. Phishing is typically carried out by e-mail or einstant message message. Myspace. It often directs the users to enter details at fake websites. . p poor usability of current web security technologies. and exploits the q . Friendster or PayPal are commonly used to lure the unsuspecting unsuspecting. Facebook.
disguised as an official e-mail eefrom a (fictional) bank. Such mistakes are common in most phishing emails.This is an example of a phishing e-mail. ( ) The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website. .
Another example of a phishing e-mail targeted at hi hi e. spelling mistakes i hi hi lli i t k in the e-mail and the presence eof an IP address in the link are both clues that this is a phishing attempt. In an example PayPal phishing.il t t d t PayPal users. .
.Phishing will lead to substantial financial loss loss. The phishers may use a person’s details to create person s fake accounts and ruin the victim’s credit.
A phishing technique was described in 1987.online-service. 1996. . The first recorded mention of the term "phishing" is on the alt. alt.onlineThe print edition of the hacker magazine 2600 was appeared on January 2.
.Attempts to deal with the growing number of reported phishing incidents include : legislation user training public awareness technical security measures.
AntiAnti-phishing Software Computer insecurity Comfidence trick Dancing pigs Defensive computing DomainKeys D i K E-mail spoofing Pharming Rock Phish Kit Social engineering Vishing .
Protect your computer with a password. change it frequently. Never provide personal information over the phone if you did not initiate the call.Not to use any links that your phishing email has p provided. . To protect yourself you need to stay all the more alert p y y y and knowledgeable.
wikipedia.com/topic/phishing#Antihttp://www.answers.http://en.org/wiki/Phishing http://www. te 2007. Thompson. 2007.answers. 2007 .com/topic/phishing#Antiphishing Shelly Cashman Vermaat Discovering Computers Shell Ca h a Ve aat. Di c e i C Vermaat.
SABRINA LEE NUR IRDINA ZAHIRAH NURUL ZAFIRAH SYARIFAH ALUWIAH .