Professional Documents
Culture Documents
Phishers work in the following ways: (1) Planning (decide the target), (2) Setup (create methods for
delivering the message and to collect the data about the target), (3) Attack (phisher sends a phony
message), (4) Collection (record the information of victims), (5) Identity theft and fraud (use the
information that they have gathered to make illegal purchases or commit fraud).
Be careful with use of WAPs; when you are using a WAP to gain access to computer on a
network
be aware of the local laws/legislations where you are doing it because things can become
dangerous from security and privacy as well legal perspective.