1. BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA PHISHING INFORMATION AND COMMUNICATION OF TECHNOLOGY
2.
3. attacks will direct the recipient to a web page designed to mimic a target organisation's own visual identity to harvest the user's personal information often leaving the victim unaware of the attack Obtaining this type of personal data is attractive to blackhats
4. Who Is Behind The Phishes & Why SCAM ARTISTS send out millions of these scam e-mails in the hopes that even a few recipients will act on them and provide their personal and financial information e-mail address that has been made public on the Internet - more susceptible to phishing e-mail address can be saved by spiders that search the Internet Compared to
5. WHY ? They can grab as many e-mail addresses as they can they can cheaply and easily access millions of valid e-mail addresses to send these scams to