Published on

Published in: Technology, Design
1 Comment
  • free free download this latest version 100% working.
    download link-
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. By : Syahida Phishing
  2. 2. List Of Sources <ul><li>Internet </li></ul><ul><li>Magazine </li></ul>
  3. 3. <ul><li>The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they &quot;fish&quot; for users' financial information and password data. </li></ul><ul><li>The most common ploy is to copy the Web page code from a major site. </li></ul><ul><li>Phishing is a type of deception designed to steal your valuable personal data. </li></ul>Introduction
  4. 4. <ul><li>In computing, phishing is a criminal activity using sicial engineering techniques. </li></ul><ul><li>Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit cards details, by masquerading as a trustworthy entity in an electronic communication. </li></ul><ul><li>eBay and PayPal are two of the most targeted companies, and online banks are also common targets. </li></ul><ul><li>Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phone contact has been used as well. </li></ul>
  5. 5. <ul><li>As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. </li></ul><ul><li>They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. </li></ul><ul><li>Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site </li></ul>How Does Phishing Scam Looks Like...?
  6. 6. <ul><li>Here are a few phrases to look for if you think an e-mail message is a Phishing scam :- </li></ul><ul><li>&quot;Verify your account.“ </li></ul><ul><li>*** If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this is Phishing scam. </li></ul><ul><li>&quot;If you don't respond within 48 hours, your account will be closed.“ </li></ul><ul><li>&quot;Dear Valued Customer.“ </li></ul><ul><li>&quot;Click the link below to gain access to your account.“ </li></ul>How to Tell If An E-mail is Fraudulent
  7. 7. <ul><li>LINK MANIPULATION </li></ul><ul><li>Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, </li></ul><ul><li>Another common trick is to make the anchor text for a link appear to be a valid URL when the link actually goes to the phishers' site. </li></ul><ul><li>An old method of spoofing links used links containing the @ symbol, originally intended as a way to include a username and password in a web link (contrary to the standard). For example, the link </li></ul>Phishing Techniques
  8. 8. <ul><li>WEBSITE FORGERY </li></ul><ul><li>Once the victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of the legitimate entity's URL over the address bar, or by closing the original address bar and opening a new one containing the legitimate URL. </li></ul><ul><li>In another popular method of phishing, an attacker uses a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge. </li></ul>
  9. 9. <ul><li>If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. </li></ul><ul><li>Before submitting financial information through a Web site, look for the &quot;lock&quot; icon on the browser's status bar. It means your information is secure during transmission. </li></ul><ul><li>Suspicious e-mail can be forwarded to, and complaints should be filed with the state attorney general's office or through the FTC at </li></ul><ul><li>You can also use anti- phishing programme such as Phishtank SiteChecker and firefox 2.0 </li></ul><ul><li>Spam filters can also help by reducing the number of phishing emails that users receive. </li></ul>How To Avoid Phishing…?
  10. 10. That’s all & Thank you…