~It is a fraudulent attempt (usually made through email) to steal someone personal details.~
Before we discuss further, lets see how the steps the attackers does while executing a phishing attack
1. Register a fake domain name [not mandatory]
2. Setup a look alike webpage
3. Send email to hundreds of users
Lets see the EXAMPLES......
CITIBANK PHISHING SCAM
Upon clicking the link, the user is directed to the following authentic-looking page:
2) Getting Anti virus and spyware protection that is current and up-to-date
Examples of anti phishing freeware
~ GFI-MailEssentials
~ Earthlink Toolbar Scamblocker
~ Webroot's Phish net
3) Use Internet Explore 7
~ Internet Explore 7 includes the Microsoft Phishing Filter, which helps protect you from Phish websie by warming or blocking you from reported phishing web Sites
If a web site is a known phishing site, the Address Bar will turns red, and the Security Bar will appear.
4) Verify the URL Example~ Phish Tank provide service that you can use to verify suspicious URL before you proceed with the transaction.
Useful references:
http://antivirus.about.com/od/emailscams/ss/phishing_2.htm
http://www.consumerfraudreporting.org/phishinglog.php
http://kb.cadzow.com.au:15384/cadzow/details.aspx?ID=1422
http://www.phishtank.com/what_is_phishing.php?view=website&annotated=true
http://www.ecommerze.blogspot.com/
http://www.anti-phishing.info/anti-phishing-freeware.htm
0 comments:
Post a Comment