CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Saturday, June 21, 2008

Phishing - Examples and its prevention methods

Phish is an Internet scam designed to cheat the recipient into revealing credit card, passwords, social security numbers and other personal information to someone who intend to use them for fraudulent purposes. For instance, the investors may submit their personal information to the phish website because it has the power influence the investors’ thinking that they are buying something from a real business. The criminals then use the personal information for their own purposes, or sell the information to other criminal parties.


The example of the phishing case is Paypal that is a spelling mistakes in the email and the presence of an IP address in the link (visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy.

The damage caused by phishing ranges from denial of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the readiness with which unsuspecting people often disclose their personal information to phishers, including credit card numbers, social security numbers, and mothers' maiden names. There are also fears that identity thieves can add such information to the knowledge they gain simply by accessing public records. Once this information is acquired, the phishers may use a person's details to create fake accounts in a victim's name. They can then spoil the victims' credit, or even refuse the victims access to their own accounts.



There have some prevention for the phishing cases:
• Prevents an attack before it happens with Early Warning System® and tools for uncovering fraudsters while they’re still in the planning stages of an attack

• Detects attacks in progress by monitoring and analyzing the industry’s widest range of intelligence sources, customer reports, and more

• Moderate loss and risk with quick effective response using a network of strategic alliances with the broadest worldwide coverage

• Arms enterprises with critical intelligence for ongoing, proactive defense, with a web portal for daily monitoring, weekly reports on industry-wide phishing activity, and details on specific attacks for customer analysis

0 comments: