CONTENTS :-IntroductionTypes of phishingExamples of phishingTechniques of phishingPrevention methods
Phishing is an attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
Phishing is typically carried out byemail spoofing orinstant messaging,and it often directs users to enter details at a fake website whoselook and feelare almost identical to the legitimate one.
Types of phishingSpear phishing
Characteristics of phishing emails
1. Disguised hyperlinks and sender address-
Appear similar as the genuine institution site. Sender address of the email also appears as originated from the targeted company.
2. Email consists of a clickable image :
Scam emails arrive as a clickable image file containing fraud request for information.
3. Content appears genuineScam email include logos, styling, contact and copyright information. identical to those used by the targeted institution.
4. Unsolicited requests for sensitive information :
Emails asks to click a link and provide sensitive personal information .
It is highly unlikely that a legitimate institution would request sensitive information in such a way.
5. Generic GreetingsScam mails are sent in bulk to many recipients and use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer".
Example of Phishing Email
By manipulating the links for example
www.facb00k.comInstead of www.facebook.com
Misspelled URLs or sub domains are common tricks used by Attacker
Key loggers are designed to monitor all the key strokes
Never respond to emails that request personal financial information
Visit banks websites by typing the URL into the address bar
Keep a regular check on your accounts
Be cautious with emails and personal data
Keep your computer secure
Use anti-spam software
Use anti-spyware software
Use the Microsoft Baseline Security Analyser (MBSA)
It is better to be safer now than feel sorry later.