This document discusses phishing, which is a fraudulent attempt to steal personal information like passwords or credit card details by masquerading as a trustworthy entity. Phishing is typically done through email or instant messages containing links to fake websites that mimic real ones. Some tactics used include IP addresses instead of domain names, misspelled domains, and embedding links to real sites on fake pages. Phishing can cause damage like identity theft and financial loss. Users should be wary of requests for sensitive data, misspelled URLs, and a sense of urgency in communications.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
This document discusses phishing, which is a fraudulent attempt to steal personal information like passwords or credit card details by masquerading as a trustworthy entity. Phishing is typically done through email or instant messages containing links to fake websites that mimic real ones. Some tactics used include IP addresses instead of domain names, misspelled domains, and embedding links to real sites on fake pages. Phishing can cause damage like identity theft and financial loss. Users should be wary of requests for sensitive data, misspelled URLs, and a sense of urgency in communications.
This document discusses phishing, which is a fraudulent attempt to steal personal information like passwords or credit card details by masquerading as a trustworthy entity. Phishing is typically done through email or instant messages containing links to fake websites that mimic real ones. Some tactics used include IP addresses instead of domain names, misspelled domains, and embedding links to real sites on fake pages. Phishing can cause damage like identity theft and financial loss. Users should be wary of requests for sensitive data, misspelled URLs, and a sense of urgency in communications.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
This document discusses phishing, which is a fraudulent attempt to steal personal information like passwords or credit card details by masquerading as a trustworthy entity. Phishing is typically done through email or instant messages containing links to fake websites that mimic real ones. Some tactics used include IP addresses instead of domain names, misspelled domains, and embedding links to real sites on fake pages. Phishing can cause damage like identity theft and financial loss. Users should be wary of requests for sensitive data, misspelled URLs, and a sense of urgency in communications.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 14
Impact Of ICT On Society
PHISHING
NAME: Chew Pang Tzen
Class: 4SC5 The Meaning Of Phishing • Phishing means a criminal activity using social engineering techniques. • Phishers attempt to fraudulently acquire sensitive infromation, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. • Phishing is typically carried out using email or an instant message • The term phishing is a leetspeak variant of fishing, probably increasingly sophisticated lures to ‘’fish for users’ financial information and passwords. The Meaning Of Phishing • Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish. • Phishing emails usually appear to come from a well- known organization and ask for your personal information — such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. Meaning Of PhiShing • In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email. Tools and Tactics • Using IP addresses instead of domain names in hyperlinks that address the take website. Many innocent users will not check that an IP address as registered and assigned to the target organization that the branded take web site claims to represent. Tools and Tactics • Registering similar sounding DNS domains and setting up fake web sites that closely mimic the domain name of the target website, in the hope that users will mistake the fake domain name for the real domain name. Tools and Tactics • Embedding hyperlinks from the real target web site into the HTML contents of an email about the fake phishing web site, so that the user’s web browser maks most of the HTTP connections to the real web server and only a small number of connections to the fake web server. IF the user’s email client software supports auto-rendering of the content, their client may attempt to connect automatically to the fake web server as soon as the email is read, and manual browser may not notice the small number of connections to a malicious server amongst the normal network activity to the real website. Example Of Phishing • Generic greeting. Phishing emails are usually sent in large batches. To save time, Internet criminals use generic names like "First Generic Bank Customer" so they don't have to type all recipients' names out and send emails one-by-one. If you don't see your name, be suspicious. • Forged link. Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a discrepency, don't click on the link. Also, websites where it is safe to enter personal information begin with "https" — the "s" stands for secure. If you don't see "https" do not proceed. Example Of Phishing • Requests personal information. The point of sending phishing email is to trick you into providing your personal information. If you receive an email requesting your personal information, it is probably a phishing attempt. • Sense of urgency. Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim. Damage Caused BY Phishing • The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit cards numbers, social security numbers, and mothers maiden names. There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s detail to create fake accounts using the victims name, using up a persons credit, or even prevent the victim from accessing to their own accounts. How They Attack • Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.maybank.home.com/. One method of spoofing links used web addresses containing the @ symbol, which were used to include a username and password in a web URL . How Detect Phishing • It is actually very noticeable. You will see misspelled URLS. One way seeing it is discovering @ in the web addresses, example http://www/hotmail.com@members.com • Some web browsers such as Mozilla and Internet Explorer has closed this off while Opera gives a warning and an option to get off the website. In another popular method of phishing, an attackers uses a bank or other services websites scripts on the victim. These types of attack known as cross – site scripting Conclusion • Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only aspect seen by the most people. The phishing economy is a decentralized and self–organized social network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud. Reference • http://www.phishtank.com/what_is_phishing. php • http://smklangkawi.edu.my/blogict/?cat=1&p aged=3 • http://en.wikipedia.org/wiki/Phishing