By : Syahida Phishing
List Of Sources Internet Magazine
The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the Web page code from a major site.  Phishing is a type of deception designed to steal your valuable personal data. Introduction
In computing,  phishing  is a criminal activity using sicial engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit cards details, by masquerading as a trustworthy entity in an electronic communication.  eBay and PayPal are two of the most targeted companies, and online banks are also common targets.  Phishing is typically carried out by email or instant messaging,  and often directs users to give details at a website, although phone contact has been used as well.
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site How Does Phishing Scam Looks Like...?
Here are a few phrases to look for if you think an e-mail message is a Phishing scam :- "Verify your account.“ *** If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this is Phishing scam. "If you don't respond within 48 hours, your account will be closed.“ "Dear Valued Customer.“ "Click the link below to gain access to your account.“ How to Tell If An E-mail  is Fraudulent
LINK MANIPULATION Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.yourbank.com.example.com/.  Another common trick is to make the anchor text for a link appear to be a valid URL when the link actually goes to the phishers' site. An old method of spoofing links used links containing the  @  symbol, originally intended as a way to include a username and password in a web link (contrary to the standard). For example, the link http://www.google.com@members.tripod.com/  Phishing Techniques
WEBSITE FORGERY Once the victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of the legitimate entity's URL over the address bar, or by closing the original address bar and opening a new one containing the legitimate URL. In another popular method of phishing, an attacker uses a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge.
If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body.  Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.  Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov. You can also use anti- phishing programme such as  Phishtank SiteChecker and firefox 2.0 Spam filters can also help by reducing the number of phishing emails that users receive. How To Avoid  Phishing…?
That’s all & Thank you…

Phishing

  • 1.
    By : SyahidaPhishing
  • 2.
    List Of SourcesInternet Magazine
  • 3.
    The term Phishingcomes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. The most common ploy is to copy the Web page code from a major site. Phishing is a type of deception designed to steal your valuable personal data. Introduction
  • 4.
    In computing, phishing is a criminal activity using sicial engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit cards details, by masquerading as a trustworthy entity in an electronic communication. eBay and PayPal are two of the most targeted companies, and online banks are also common targets. Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phone contact has been used as well.
  • 5.
    As scam artistsbecome more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site How Does Phishing Scam Looks Like...?
  • 6.
    Here are afew phrases to look for if you think an e-mail message is a Phishing scam :- "Verify your account.“ *** If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this is Phishing scam. "If you don't respond within 48 hours, your account will be closed.“ "Dear Valued Customer.“ "Click the link below to gain access to your account.“ How to Tell If An E-mail is Fraudulent
  • 7.
    LINK MANIPULATION Mostmethods of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.yourbank.com.example.com/. Another common trick is to make the anchor text for a link appear to be a valid URL when the link actually goes to the phishers' site. An old method of spoofing links used links containing the @ symbol, originally intended as a way to include a username and password in a web link (contrary to the standard). For example, the link http://www.google.com@members.tripod.com/ Phishing Techniques
  • 8.
    WEBSITE FORGERY Oncethe victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of the legitimate entity's URL over the address bar, or by closing the original address bar and opening a new one containing the legitimate URL. In another popular method of phishing, an attacker uses a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge.
  • 9.
    If you receivean unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission. Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general's office or through the FTC at www.ftc.gov. You can also use anti- phishing programme such as Phishtank SiteChecker and firefox 2.0 Spam filters can also help by reducing the number of phishing emails that users receive. How To Avoid Phishing…?
  • 10.
    That’s all &Thank you…