SlideShare a Scribd company logo
1 of 20
PHISHING
BY:- Sagar Rai P
I MSc Computer Science
PHISHING BASICS
•The word has its origin from two words “Password Harwesting”
or fishing for Passwords.
•Phishing is the attempt to obtain sensitive information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money), often for malicious reasons, by masquerading
as a trustworthy entity in an electronic communication.
•Also known as “brand spoofing”
•Phishers are phishing artists.
•Phishing techniques was described
in detail in the year 1987 and this
Technique was first used in the year
1995
Phishing Definition
•Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money), often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication.
•It tries to trick users with official looking messages
•Credit card
•Bank account
•eBay
•PayPal
•Some phishing emails also contain malicious or
unwanted software that can track your activities or
slow your computer.
Comparison To Spam
•The purpose of a phishing message is to acquire
sensitive information about a user. For doing so the
message needs to deceive the intended recipient.
•So it doesn’t contains any useful information
and hence falls under the category of spam.
•A spam message tries to sell a product or service,
whereas phishing message needs to look like it is from a
legitimate organization.
•Techniques applied to spam message can’t be applied
naively to phishing messages.
Existing System
•Detect and block the phishing websites in
time.
•Enhance the security of the websites
•Block the phishing emails by various spam
filters.
•Install online anti-phishing software in user’s
computers.
Top 10 Phishing Sites Hosting Countries
How Phishing Attack
•Hacker embeds fake login form to XSS vulnerable page.
It might be online shop, internet banking, payment
system, etc
•Hacker sends Email with the link to this transformed
page(actually link contains HTML injection code as a
parameter). This email looks pretty similar to emails
typically sent from this website to registered users(only
without user name in greeting)
•User clicks the link and opens fake web-page. If user
enters his username and password to login , all of their
account details will be sent to hackers web-server.
•User may not notice anything strange because real
“home” or “Welcome” pages are what he was expecting
to see.
How Phishing Attack
Damages Caused By Phishing
•The damage caused by phishing ranges from loss of access to
email to substantial financial loss. This style of identity theft is
becoming more popular, because of the ease with which
unsuspecting people often divulge personal information to
phishers, including credit card numbers, social security numbers,
and mothers maiden names. There are also fears that identity
thieves can obtain some such information simply by accessing
public records. Once they have the information they need and
want, the phishers will use that person’s details to create fake
accounts using the victims name, using up a persons credit. Or
even prevent the victim from accessing to their own accounts.
How To Detect Phishing Website?
How Does a Phishing Email
Message look like?!!
•Spelling and bad grammar. Cybercriminals are not known
for their grammar and spelling.
•Beware of links in email. If you see a link in a suspicious
email message, don’t click on it.
•Threats. Have ever received a threat that your Hotmail
account would be closed if you didn’t respond to an email
message? The email message shown in the next slide is an
example of the same trick.
•Spoofing popular websites or companies, scam artist use
graphics in an email that appear to be connected to
legitimate websites but actually take you to phony scam
sites or legitimate-looking pop-up windows.
How does a Phishing Email message look like
Example for Phishing Website
Functions.
Prevention to be taken to avoid
Phishing
•Prevention: What to do
•Protect your computer with anti-virus software,
spyware filters, e-mail filters, and firewall programs,
and make sure that they are regularly updated.
•Ensure that your Internet browser is up to date and
security patches applied.
•Avoid responding any unknown email or giving your
financial information to that email.
•Unless the email is digitally signed, it should also be
fake.
•Phishers typically ask for information such as
usernames, passwords, credit card numbers, social
security numbers, etc.
Prevention to be taken to avoid Phishing
•Phishers typically are typically not personalized, while valid
message from your bank or e-commerce company are generally
personalized.
•Always ensure that you’re using a secure website when
submitting credit card or other sensitive information via your
Web Browser.
•To make sure you’re on a secure Web server, check the
beginning of the Web address bar –it should be “https:// “rather
just ” http://”.
•Regularly log into your online accounts. Don’t leave them for a
long period of time.
•Regularly check your bank, credit and debit card statements to
ensure that all transaction are legitimate.
•If anything is suspicious, contact your bank and all card issuers.
Prevention: What not to do
•Don’t assume that you can correctly identify a
website as legitimate by just looking at it.
•Don’t use the links in an email to get to any web
page, if you think that the message might not be
authentic.
•Log onto the website directly by typing in the web
address in your browser.
•Avoid filling out forms in email messages that ask for
personal financial information.
•You should only communicate information such as
credit card numbers or account information via a
secure website or the telephone.
Conclusion
•Phishing is identity theft. It is fraud. It masquerades as
legitimate and trustworthy entities in order to obtain sensitive
data. It then uses it to “rip off” the misled user with often tragic
consequences.
•Phishing is a form of criminal conduct that poses increasing
threats to consumers, financial institution and commercial
enterprises in Canada, united States, and other countries.
Because phishing shows no sign of abating, and indeed is likely
to continue in newer and more sophisticated forms, law
enforcement, other countries will need to cooperate more
closely than ever in their efforts to combat phishing, through
improved public education, prevention, authentication, and
binational and national enforcement efforts.
Source Of Information
•www.wikipedia.org
•www.antiphishing.org
•www.google.com
•www.webopedia.com
•www.computerworld.com
•www.honeynet.org
Phishing

More Related Content

What's hot

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Phishing ppt
Phishing pptPhishing ppt
Phishing pptshindept123
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack Shubh Thakkar
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and preventionStephen Hasford
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
Phishing
PhishingPhishing
PhishingHHSome
 

What's hot (20)

Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing
PhishingPhishing
Phishing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing
PhishingPhishing
Phishing
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing
PhishingPhishing
Phishing
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on PhishingCreative Technology
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Phishing
PhishingPhishing
PhishingSyahida
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing
PhishingPhishing
Phishingdefquon
 
Phishing
PhishingPhishing
Phishingoitaoming
 
Phishing technology
Phishing technologyPhishing technology
Phishing technologyPreeti Papneja
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Primera guerra mundial
Primera guerra mundialPrimera guerra mundial
Primera guerra mundialDaniela Moreno
 
Macchine intelligenti che imparano da sole
Macchine intelligenti che imparano da soleMacchine intelligenti che imparano da sole
Macchine intelligenti che imparano da soleFausto Intilla
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSACarl Saiyed
 
BSidesDC 2016 Beyond Automated Testing
BSidesDC 2016 Beyond Automated TestingBSidesDC 2016 Beyond Automated Testing
BSidesDC 2016 Beyond Automated TestingAndrew McNicol
 
RESUMO - GEOMARKETING - Estudo de Caso
RESUMO - GEOMARKETING - Estudo de CasoRESUMO - GEOMARKETING - Estudo de Caso
RESUMO - GEOMARKETING - Estudo de CasoIgor Alves
 
Intro phishing
Intro phishingIntro phishing
Intro phishingSayali Dayama
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk Machine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk Splunk
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 

Viewers also liked (20)

A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Primera guerra mundial
Primera guerra mundialPrimera guerra mundial
Primera guerra mundial
 
Macchine intelligenti che imparano da sole
Macchine intelligenti che imparano da soleMacchine intelligenti che imparano da sole
Macchine intelligenti che imparano da sole
 
Saiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSASaiyed_Crypto_Article_ISSA
Saiyed_Crypto_Article_ISSA
 
BSidesDC 2016 Beyond Automated Testing
BSidesDC 2016 Beyond Automated TestingBSidesDC 2016 Beyond Automated Testing
BSidesDC 2016 Beyond Automated Testing
 
RESUMO - GEOMARKETING - Estudo de Caso
RESUMO - GEOMARKETING - Estudo de CasoRESUMO - GEOMARKETING - Estudo de Caso
RESUMO - GEOMARKETING - Estudo de Caso
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk Machine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 

Similar to Phishing

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training PhishingAtl Edu
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsJohn Poster
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Day 2
Day 2Day 2
Day 2sefreed
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 

Similar to Phishing (20)

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Phis
PhisPhis
Phis
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail Scams
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Day 2
Day 2Day 2
Day 2
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 

Recently uploaded

VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 

Phishing

  • 1. PHISHING BY:- Sagar Rai P I MSc Computer Science
  • 2. PHISHING BASICS •The word has its origin from two words “Password Harwesting” or fishing for Passwords. •Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. •Also known as “brand spoofing” •Phishers are phishing artists. •Phishing techniques was described in detail in the year 1987 and this Technique was first used in the year 1995
  • 3. Phishing Definition •Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. •It tries to trick users with official looking messages •Credit card •Bank account •eBay •PayPal •Some phishing emails also contain malicious or unwanted software that can track your activities or slow your computer.
  • 4. Comparison To Spam •The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. •So it doesn’t contains any useful information and hence falls under the category of spam. •A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. •Techniques applied to spam message can’t be applied naively to phishing messages.
  • 5. Existing System •Detect and block the phishing websites in time. •Enhance the security of the websites •Block the phishing emails by various spam filters. •Install online anti-phishing software in user’s computers.
  • 6. Top 10 Phishing Sites Hosting Countries
  • 7. How Phishing Attack •Hacker embeds fake login form to XSS vulnerable page. It might be online shop, internet banking, payment system, etc •Hacker sends Email with the link to this transformed page(actually link contains HTML injection code as a parameter). This email looks pretty similar to emails typically sent from this website to registered users(only without user name in greeting) •User clicks the link and opens fake web-page. If user enters his username and password to login , all of their account details will be sent to hackers web-server. •User may not notice anything strange because real “home” or “Welcome” pages are what he was expecting to see.
  • 9. Damages Caused By Phishing •The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit card numbers, social security numbers, and mothers maiden names. There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s details to create fake accounts using the victims name, using up a persons credit. Or even prevent the victim from accessing to their own accounts.
  • 10. How To Detect Phishing Website?
  • 11. How Does a Phishing Email Message look like?!! •Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. •Beware of links in email. If you see a link in a suspicious email message, don’t click on it. •Threats. Have ever received a threat that your Hotmail account would be closed if you didn’t respond to an email message? The email message shown in the next slide is an example of the same trick. •Spoofing popular websites or companies, scam artist use graphics in an email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
  • 12. How does a Phishing Email message look like
  • 15. Prevention to be taken to avoid Phishing •Prevention: What to do •Protect your computer with anti-virus software, spyware filters, e-mail filters, and firewall programs, and make sure that they are regularly updated. •Ensure that your Internet browser is up to date and security patches applied. •Avoid responding any unknown email or giving your financial information to that email. •Unless the email is digitally signed, it should also be fake. •Phishers typically ask for information such as usernames, passwords, credit card numbers, social security numbers, etc.
  • 16. Prevention to be taken to avoid Phishing •Phishers typically are typically not personalized, while valid message from your bank or e-commerce company are generally personalized. •Always ensure that you’re using a secure website when submitting credit card or other sensitive information via your Web Browser. •To make sure you’re on a secure Web server, check the beginning of the Web address bar –it should be “https:// “rather just ” http://”. •Regularly log into your online accounts. Don’t leave them for a long period of time. •Regularly check your bank, credit and debit card statements to ensure that all transaction are legitimate. •If anything is suspicious, contact your bank and all card issuers.
  • 17. Prevention: What not to do •Don’t assume that you can correctly identify a website as legitimate by just looking at it. •Don’t use the links in an email to get to any web page, if you think that the message might not be authentic. •Log onto the website directly by typing in the web address in your browser. •Avoid filling out forms in email messages that ask for personal financial information. •You should only communicate information such as credit card numbers or account information via a secure website or the telephone.
  • 18. Conclusion •Phishing is identity theft. It is fraud. It masquerades as legitimate and trustworthy entities in order to obtain sensitive data. It then uses it to “rip off” the misled user with often tragic consequences. •Phishing is a form of criminal conduct that poses increasing threats to consumers, financial institution and commercial enterprises in Canada, united States, and other countries. Because phishing shows no sign of abating, and indeed is likely to continue in newer and more sophisticated forms, law enforcement, other countries will need to cooperate more closely than ever in their efforts to combat phishing, through improved public education, prevention, authentication, and binational and national enforcement efforts.