Phishing


The main purpose of phishing is to get access to the passwords, customer’s accounts. Phishers try to trick users by impersonating other people via Web sites, emails etc. Most phishing are done through e-mail. Example, the email contain a message stating that a particular amount has been taken from the user’s account. A link is provided to check his or her balance, or may contain a link to perform a security check for the user’s account.

Many of users do not know about how e-mail and Web sites work. Phishers exploit this lack of knowledge to acquire sensitive information. Phishers can fool users by convincing them to go to fake Web site. For example, for a URL of www.foryou.com , the phisher may develop a new Web site called www.4you.com , which looks similar to the original URL.

Most phishing attacks are perpetrated through e-mail.

Process of Phishing

  1. Register a fake domain name.
  2. Build a look-alike Web site.
  3. Send e-mails to many users.

Antiphishing

The best effective strategy is to educate users as to the dangers of phishing attacks.

By entering the URL in a browser manually rather than following a link when an e-mail asks.

more info visit http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

Advertisements

About Buja Atdhe

CEO of the platform
Gallery | This entry was posted in CEH and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s