Your SlideShare is downloading. ×
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Phishing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Phishing

6,279

Published on

Published in: Technology, Design
1 Comment
6 Likes
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
6,279
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
394
Comments
1
Likes
6
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. By : Syahida Phishing
  • 2. List Of Sources
    • Internet
    • Magazine
  • 3.
    • The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data.
    • The most common ploy is to copy the Web page code from a major site.
    • Phishing is a type of deception designed to steal your valuable personal data.
    Introduction
  • 4.
    • In computing, phishing is a criminal activity using sicial engineering techniques.
    • Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit cards details, by masquerading as a trustworthy entity in an electronic communication.
    • eBay and PayPal are two of the most targeted companies, and online banks are also common targets.
    • Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phone contact has been used as well.
  • 5.
    • As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows.
    • They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.
    • Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site
    How Does Phishing Scam Looks Like...?
  • 6.
    • Here are a few phrases to look for if you think an e-mail message is a Phishing scam :-
    • "Verify your account.“
    • *** If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this is Phishing scam.
    • "If you don't respond within 48 hours, your account will be closed.“
    • "Dear Valued Customer.“
    • "Click the link below to gain access to your account.“
    How to Tell If An E-mail is Fraudulent
  • 7.
    • LINK MANIPULATION
    • Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.yourbank.com.example.com/.
    • Another common trick is to make the anchor text for a link appear to be a valid URL when the link actually goes to the phishers' site.
    • An old method of spoofing links used links containing the @ symbol, originally intended as a way to include a username and password in a web link (contrary to the standard). For example, the link http://www.google.com@members.tripod.com/
    Phishing Techniques
  • 8.
    • WEBSITE FORGERY
    • Once the victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of the legitimate entity's URL over the address bar, or by closing the original address bar and opening a new one containing the legitimate URL.
    • In another popular method of phishing, an attacker uses a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge.
  • 9.
    • If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body.
    • Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
    • Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov.
    • You can also use anti- phishing programme such as Phishtank SiteChecker and firefox 2.0
    • Spam filters can also help by reducing the number of phishing emails that users receive.
    How To Avoid Phishing…?
  • 10. That’s all & Thank you…

×