Internet   Phishing Brenda, Liam, Maria, Romario and Yu-jin
What is  Phishing ? <ul><li>Internet fraud </li></ul><ul><li>-Most widespread </li></ul><ul><li>Phishing: “Fishing” for pe...
How Do They ‘Phish’? <ul><li>E-mails </li></ul><ul><li>Images (instead of text) </li></ul><ul><li>-Phishers have used imag...
<ul><li>Did you ever receive an email that appeared to be from your bank? </li></ul><ul><li>Did you click a link that sent...
Real case of internet Phishing <ul><li>In Johannesburg </li></ul><ul><li>She is now has been arrested in the pending Vodac...
 
How to avoid Phishing? <ul><li>Keeping your antivirus updated will prevent a Trojan disguising your Web address bar or mim...
<ul><li>By using anti-spam software you can reduce many types of phishing attacks because the messages will never end up i...
Sources <ul><li>http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_conten...
Upcoming SlideShare
Loading in...5
×

Internet Phishing - Liam, Romario, Maria R., Brenda and Yu Jin

1,781
-1

Published on

Our Video on Phishing

Published in: Economy & Finance, Business
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,781
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
76
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide
  • Most attacks come in the form of spam.
  • Internet Phishing - Liam, Romario, Maria R., Brenda and Yu Jin

    1. 1. Internet Phishing Brenda, Liam, Maria, Romario and Yu-jin
    2. 2. What is Phishing ? <ul><li>Internet fraud </li></ul><ul><li>-Most widespread </li></ul><ul><li>Phishing: “Fishing” for personal, valuable information </li></ul><ul><li>What kind of information do they ‘phish’ for? : </li></ul><ul><li>-Social security number </li></ul><ul><li>-User ID’s </li></ul><ul><li>-Passwords </li></ul><ul><li>-Financial information </li></ul>
    3. 3. How Do They ‘Phish’? <ul><li>E-mails </li></ul><ul><li>Images (instead of text) </li></ul><ul><li>-Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails. </li></ul><ul><li>Masquerades as a well-known, trustworthy company or a legitimate organization </li></ul>
    4. 4. <ul><li>Did you ever receive an email that appeared to be from your bank? </li></ul><ul><li>Did you click a link that sent you to what looked like your bank's website? </li></ul><ul><li>Did you enter your username and password? </li></ul><ul><li>When you clicked submit, did the site turn out to be bogus? </li></ul>
    5. 5. Real case of internet Phishing <ul><li>In Johannesburg </li></ul><ul><li>She is now has been arrested in the pending Vodacom banking fraud case. </li></ul><ul><li>Stole money from four major banks - National Bank, Standard Bank, Absa, Ned bank, and Capitec Bank. </li></ul><ul><li>They stole the banking details. </li></ul>
    6. 7. How to avoid Phishing? <ul><li>Keeping your antivirus updated will prevent a Trojan disguising your Web address bar or mimicking an https secure link.  </li></ul><ul><li>It is never a good idea to click on any hyperlink in an e-mail, especially from unknown sources. </li></ul><ul><li>Some hyperlinks can take you to a fake HTML page that may try to scam you into typing sensitive information. </li></ul>
    7. 8. <ul><li>By using anti-spam software you can reduce many types of phishing attacks because the messages will never end up in the mailboxes of end users. </li></ul><ul><li>Whenever you are passing sensitive information such as credit cards or bank information, make sure the address bar shows &quot;https://&quot; rather than just http:// </li></ul><ul><li>A common phishing technique is to launch a bogus pop-up window when someone clicks on a link in a phishing e-mail message. </li></ul><ul><li>  </li></ul>
    8. 9. Sources <ul><li>http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html </li></ul><ul><li>http://www.news24.com/Content/SouthAfrica/News/1059/4f78242b331d49e980a0174b56d23fe3/11-09-2009-01-05/3rd_arrest_in_phishing_case </li></ul><ul><li>http://articles.techrepublic.com.com/5100-10878_11-5818568.html </li></ul><ul><li>http://www.ehow.com/how_2325220_prevent-phishing-attacks.html </li></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×