List Of Sources <ul><li>Internet </li></ul><ul><li>Magazine </li></ul>
<ul><li>The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. </li></ul><ul><li>The most common ploy is to copy the Web page code from a major site. </li></ul><ul><li>Phishing is a type of deception designed to steal your valuable personal data. </li></ul>Introduction
<ul><li>In computing, phishing is a criminal activity using sicial engineering techniques. </li></ul><ul><li>Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit cards details, by masquerading as a trustworthy entity in an electronic communication. </li></ul><ul><li>eBay and PayPal are two of the most targeted companies, and online banks are also common targets. </li></ul><ul><li>Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phone contact has been used as well. </li></ul>
<ul><li>As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. </li></ul><ul><li>They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. </li></ul><ul><li>Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site </li></ul>How Does Phishing Scam Looks Like...?
<ul><li>Here are a few phrases to look for if you think an e-mail message is a Phishing scam :- </li></ul><ul><li>"Verify your account.“ </li></ul><ul><li>*** If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this is Phishing scam. </li></ul><ul><li>"If you don't respond within 48 hours, your account will be closed.“ </li></ul><ul><li>"Dear Valued Customer.“ </li></ul><ul><li>"Click the link below to gain access to your account.“ </li></ul>How to Tell If An E-mail is Fraudulent
<ul><li>LINK MANIPULATION </li></ul><ul><li>Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.yourbank.com.example.com/. </li></ul><ul><li>Another common trick is to make the anchor text for a link appear to be a valid URL when the link actually goes to the phishers' site. </li></ul><ul><li>An old method of spoofing links used links containing the @ symbol, originally intended as a way to include a username and password in a web link (contrary to the standard). For example, the link http://email@example.com/ </li></ul>Phishing Techniques
<ul><li>If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. </li></ul><ul><li>Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission. </li></ul><ul><li>Suspicious e-mail can be forwarded to firstname.lastname@example.org, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov. </li></ul><ul><li>You can also use anti- phishing programme such as Phishtank SiteChecker and firefox 2.0 </li></ul><ul><li>Spam filters can also help by reducing the number of phishing emails that users receive. </li></ul>How To Avoid Phishing…?