• Like
Tittl e
Upcoming SlideShare
Loading in...5
Uploaded on


  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. TittlE : PhishinG Group name:Shom wei yong(captain) Yun youliang Kavi Toh jun hou
  • 2. Contents !!* How they Attack ??* What Is Phishing ??* How To Detect ??* Example* Damage Caused By Phishing.* Conclusion.*Sources Of References.
  • 3. What Is Phishing* Phishing is defines as thefraudulent acquisition of personalinformation by tricking anindividual into believing theattacker is a trustworty entity thisis normally done throught emailand an instant message.
  • 4. How they attack…•Most attacks of phishing use some form oftechnical deception designed to make a linkin an email appear to belong to the spoofedorganization . Misspelled URLs or the use ofsubdomains are common trick used byphishers,hhttp://www.maybank.home.com/* One method of spoofing links used webaddresses containing the @ symbol, whichwere used include username and passwordin a web URL
  • 5. How To DETecT* Is is actually very noticeable. You will see misspelledURLs .One way seeing discovering @ in the web adressese.g.http:/www.hotmail.com@members.com* Some web browers such as Mozilla and internetExplorer has closed this off while Opera gives a warningand an optain to get off the website. In another popularmethod of phishing, an attacker uses a bank or otherservices website scripts on the victim. These types ofatack known as crosssite scripting.
  • 6. DAMAGE CAUSED BY pHISHING•The damage caused by phishing ranges fromloss of access to email to substantailfinancial loss. This style of identity thefy isbecoming more popular,because of the easewith which unsuspecting people oftendivulge personal information tophishers,including credit card number,sosialsecurity number anf miothers maiden names.*There are also fears that identify theivescan obtain some such information they needand want the phishers will use that person’sdetail to create fake account using thevictims name, using up a persons credit oreven the victim from accesssing their ownacounts.
  • 7. Conclusion !!* Phishing e-mails are only a small aspet of theoverall phishing economy and until now, the onlyaspet seen by the most people. The phishingeconomy is a decentralized and self-organizedsosial network of merchants and consumersgoverned by laws of supply and demand. Thisclearer picture of the landscape, the players, andinsight into phishing operations will hopefully assistin the fight against online fraud.
  • 8. Sources and reference*www.google.com*www.wikipedia.com*http:/www.hotmail.com@members.com*hhttp://www.maybank.home.com/