You are on page 1of 14

„ Phishing is an Internet Scam designed to trick

recipients
p into revealing
g their p
personal
information such as :

„ Usernames
„ Passwords
„ Credit cards
„ Social security
y numbers
„ Some porpular websites such as YouTube,
Facebook, Myspace, Friendster or PayPal are
commonly used to lure the unsuspecting.
unsuspecting
„ Phishing is typically carried out by e-
e-mail or
instant message.
message
„ It often directs the users to enter details at fake
websites.
„ Phishing is also an example of social engineering
techniques
q used to fool users,, and exploits
p the
poor usability of current web security
technologies.
This is an example of a phishing e-
e-mail, disguised as an official e
e--mail
from a ((fictional)) bank.

„ The sender is attempting to trick the recipient into revealing


secure information by "confirming" it at the phisher's website.
Such mistakes are common in most phishing emails.
Another example of a
phishing
hi hi e-e-mail
il targeted
t t d att
PayPal users.

In an example PayPal
phishing,
hi hi spelling
lli mistakes
i t k iin
the ee--mail and the presence
of an IP address in the link
are both clues that this is a
phishing attempt.
„ Phishing will lead to substantial financial loss.
loss

„ The phishers may use a person’s


person s details to create
fake accounts and ruin the victim’s credit.
„ A phishing technique was described in 1987.

„ The first recorded mention of the term


"phishing" is on the alt.online-
alt.online-service.

„ The print edition of the hacker magazine


2600 was appeared on January 2, 1996.
Attempts to deal with the growing number of
reported phishing incidents include :

„ legislation
„ user training
„ public awareness
„ technical security measures.
„ Anti-phishing Software
Anti-
„ Computer insecurity
„ Comfidence trick
„ Dancing pigs
„ Defensive computing
„ DomainKeys
D i K
„ E-mail spoofing
„ Pharming
„ Rock Phish Kit
„ Social engineering
„ Vishing
„ Not to use any links that your phishing email has
p
provided.
„ Never provide personal information over the phone
if you did not initiate the call.
„ Protect your computer with a password, change it
frequently.

To p
protect yourself
y you
y need to stay
y all the more alert
and knowledgeable.
„ http://en.wikipedia.org/wiki/Phishing

„ http://www.answers.com/topic/phishing#Anti-
http://www.answers.com/topic/phishing#Anti-
phishing

„ Shell Cashman
Shelly Ca h a Vermaat
Ve aat, Discovering
Vermaat, Di c e i C Computers
te
2007,, Thompson, 2007
2007
„ SABRINA LEE
„ NUR IRDINA ZAHIRAH
„ NURUL ZAFIRAH
„ SYARIFAH ALUWIAH