Phishing: Examples and its prevention methods

Wednesday, February 4, 2009
What is phishing???
Phishing is a technique in which the attacker using fraudulent e-mail messages that appears to come from legitimate businesses to gain personal information for purposes of identity theft. The email often uses fear tactics in an effort to entice the intended fool recipients into visiting a fraudulent website. The recipient is instructed to login to their account and enter the sensitive financial information such as their bank PIN number, their Social Security number, mother's maiden name, etc. The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss.

Examples of Phishing


eBay phishing scam


Look at the link here. It looks as valid as it could. It is written http://signin.ebay.com, but this written link actually points to a clone of ebay. The Address shows ebay, but Con artist will link you to dupes of legit business websites and scam you. Beware what you click, your browser shows you the link in the left bottom corner if you only point over the link, without clicking it.

Fraudulent e-mails
Phishing e-mail messages and pop-up windows are often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.
The following is an example of what a phishing scam e-mail message might look like.


Example of a phishing e-mail message, including a deceptive URL address linking to a scam Website.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called "spoofed" Web sites. Once you're at one of these spoofed sites, you might unwittingly send personal information to the con artists.

Phishing prevention methods

There are many techniques to combat phishing such as social responses and technical responses.

Social Responses
To combat phishing by training people how to recognize phishing attempts and how to deal with them. Education can be effective way to combat, especially where training provides direct feedback. People avoid phishing attempts slightly modifying their browsing habits. For example, when asking about an account needing to be verified or any other topic used by phishers, it is a sensible precaution to contact the company from which the e-mail apparently originates to check that the e-mail is legitimate.


Technical Responses
There are a few of method to prevent phishing by using technical:
a)
Eliminating phishing mail
Recipients can use specialized spam filters to reduce the number of phishing e-mails that reach their inboxes.

b) Browsers altering users to fraudulent websites
Users may list of the known phishing sites and to check websites against the list.


PLEASE familiarize yourself for the examples of phishing scams. Don’t be the next victim!!!!

http://en.wikipedia.org/wiki/Phishing
http://www.bustathief.com/what-is-phishing-ebay-phishing-examples/

0 comments:

Post a Comment