Your SlideShare is downloading. ×
Phishing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Phishing

1,698

Published on

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,698
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
206
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Phishing is a con game that scammers use to collect personal information from unsuspecting users.
    Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information.
  • Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. It includes theft of passwords, credit card numbers, bank account details and other confidential information.
  • By phishing hacker can get the information like your name , address , date of birth . Hacker get your social security number, Driver’s License number,
    Credit Card numbers and cards like atm card & telephone calling cards.
  • Link manipulation: Link manipulation is the technique in which the phisher sends a link to a website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the website mentioned in the link. (To prevent link manipulation is to move the mouse over the link to view the actual address.)
    Key loggers refer to the malware used to identify inputs from the keyboard. The information is sent to the hackers who will decipher passwords and other types of information.( To prevent key loggers from accessing personal information, secure websites provide options to use mouse click to make entries through the virtual keyboard.)
    In session hacking, the phisher exploits the web session control mechanism to steal information from the user.( In a simple session hacking procedure known as session sniffing, the phisher can use a sniffer to intercept relevant information so that he or she can access the Web server illegally.)
    In phone phishing, the phisher makes phone calls to the user and asks the user to dial a number.Due to this phisher get personal information of the bank account through the phone. Phone phishing is mostly done with a fake caller ID.
    (Phishing scams involving malware require it to be run on the user’s computer. The malware is usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files.)
  • Protect your computer with anti-virus software, spyware filters, e-mail filters, and firewall programs, and make sure that they are regularly updated.
    Be suspicious of any e-mail with urgent requests for personal financial information or threats of termination of online accounts.
  • Avoid filling out forms in e-mail messages or pop-up windows that ask for personal financial information.
    Don’t use the links in an e-mail to get to any web page, if you suspect the message might not be authentic. Instead, call the company on the telephone, or log onto the website directly by typing in the Web address in your browser
  • Transcript

    • 1. • • • • Komal Ramole Smita Deore Kiran Patil Snehal More
    • 2. • Introduction • What is Phishing?? • What kind of information do the hackers want? • How Phishing is done? • Techniques of Phishing • Prevention • Conclusion
    • 3. Origin of word “Phishing” from two words – ‘Password’ & ‘Harvesting’. Phishing is a con game that scammers use to collect personal information from unsuspecting users. Phishing:1
    • 4.  Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception.  Phishing refers to a person or a group of cybercriminals who create copy of an existing legitimate website. Phishing:2
    • 5.  Your name, address and date of birth  Social Security number  Driver’s License number  Credit Card numbers  ATM cards  Telephone calling cards Phishing:3
    • 6. Phishing:4
    • 7. Phishing:5
    • 8. Phishing:6
    • 9. Phishing:7
    • 10. Phishing:8
    • 11. Phishing:9
    • 12. Phishing:10
    • 13.  Protect your computer with anti-virus software.  Ensure that your Internet browser is up to date and security patches applied.  Be suspicious of any e-mail with urgent requests. Phishing:11
    • 14. Avoid filling out forms in e-mail messages or pop-up windows . Don’t use the links in an e-mail to get to any web page, if you suspect the message might not be authentic. Phishing:12
    • 15. Be Alert , Be Wary, and Be Informed !!! Phishing:13

    ×