Final Phishing

Embed Size (px)



Text of Final Phishing

  • CONTENTS :-IntroductionTypes of phishingExamples of phishingTechniques of phishingPrevention methods



  • Phishing is an attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

    Phishing is typically carried out byemail spoofing orinstant messaging,and it often directs users to enter details at a fake website whoselook and feelare almost identical to the legitimate one.

  • Types of phishingSpear phishing

    Clone phishing

    Whaling phishing

  • Characteristics of phishing emails

  • 1. Disguised hyperlinks and sender address-

    Appear similar as the genuine institution site. Sender address of the email also appears as originated from the targeted company.

  • 2. Email consists of a clickable image :

    Scam emails arrive as a clickable image file containing fraud request for information.

  • 3. Content appears genuineScam email include logos, styling, contact and copyright information. identical to those used by the targeted institution.

  • 4. Unsolicited requests for sensitive information :

    Emails asks to click a link and provide sensitive personal information .

    It is highly unlikely that a legitimate institution would request sensitive information in such a way.

  • 5. Generic GreetingsScam mails are sent in bulk to many recipients and use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer".

  • Phishing Techniques

  • Example of Phishing Email

  • By manipulating the links for example

    www.facb00k.comInstead of

    Misspelled URLs or sub domains are common tricks used by Attacker

  • Key loggers are designed to monitor all the key strokes

  • Never respond to emails that request personal financial information

    Visit banks websites by typing the URL into the address bar

    Keep a regular check on your accounts

    Be cautious with emails and personal data

  • Keep your computer secure

    Use anti-spam software

    Use anti-spyware software

    Use the Microsoft Baseline Security Analyser (MBSA)

    Use Firewall

  • It is better to be safer now than feel sorry later.

    Thank you.