Tip & How-To about Computers & Internet

Phishing "Protect urself" Know What Hackers Do !This is a featured page


Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims.
Phishing scammers continue to find new victims all around the world

A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

To be Continued

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

2 Answers

Is Facebook giving Facebook users cash rewards?


no they are not . it is probably a scammer phishing for your info

May 17, 2017 | Facebook Computers & Internet

1 Answer

307266 is your Facebook Messenger for Android confirmation code


My guess is some type of phishing scam. There is no codes required for Messenger. The scammers blanket spam millions of people hoping to strike lucky with people that have the program and enter their passwords.

May 23, 2016 | Facebook Computers & Internet

4 Answers

Internet Explorer 8 vs. Norton Protection Center


Symantec/Norton has actually done a very good thing. You can update to Norton NIS2008 for FREE.
It solves the phishing problem and is a greatly improved product. CCSVCHOST.EXE does not run continuously and there is a resource meter to show what CPU usage Norton is taking. Scans are faster and web page loading is instantaneous.

Mar 20, 2009 | Microsoft Internet Explorer 8

Not finding what you are looking for?

212 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...