Phishing is an Internet Scam designed to trick recipients into revealing their personal p g p information such as : Usernames Passwords Credit cards Social security numbers y .

Phishing is also an example of social engineering techniques used to fool users. It often directs the users to enter details at fake websites. p poor usability of current web security technologies. Myspace.Some porpular websites such as YouTube. Facebook. Friendster or PayPal are commonly used to lure the unsuspecting unsuspecting. Phishing is typically carried out by e-mail or einstant message message. and exploits the q . .

.

Such mistakes are common in most phishing emails. ( ) The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website. disguised as an official e-mail eefrom a (fictional) bank.This is an example of a phishing e-mail. .

Another example of a phishing e-mail targeted at hi hi e. spelling mistakes i hi hi lli i t k in the e-mail and the presence eof an IP address in the link are both clues that this is a phishing attempt. In an example PayPal phishing. .il t t d t PayPal users.

. The phishers may use a person’s details to create person s fake accounts and ruin the victim’s credit.Phishing will lead to substantial financial loss loss.

alt.onlineThe print edition of the hacker magazine 2600 was appeared on January 2.A phishing technique was described in 1987. The first recorded mention of the term "phishing" is on the alt. 1996. .online-service.

.Attempts to deal with the growing number of reported phishing incidents include : legislation user training public awareness technical security measures.

AntiAnti-phishing Software Computer insecurity Comfidence trick Dancing pigs Defensive computing DomainKeys D i K E-mail spoofing Pharming Rock Phish Kit Social engineering Vishing .

Not to use any links that your phishing email has p provided. . Protect your computer with a password. Never provide personal information over the phone if you did not initiate the call. change it frequently. To protect yourself you need to stay all the more alert p y y y and knowledgeable.

Thompson.wikipedia. 2007 .com/topic/phishing#Antiphishing Shelly Cashman Vermaat Discovering Computers Shell Ca h a Ve aat.answers.org/wiki/Phishing http://www. te 2007. Di c e i C Vermaat. 2007.http://en.com/topic/phishing#Antihttp://www.answers.

SABRINA LEE NUR IRDINA ZAHIRAH NURUL ZAFIRAH SYARIFAH ALUWIAH .

Sign up to vote on this title
UsefulNot useful