Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing and Pharming: Dangerous Scams > NetSparsh - Viral Content you Love & Share

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how?

Two Pharmings

Actually, two completely different fields use the term "pharming" now. We can say there exist two separate "pharmings".

If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is a very interesting matter, this article is not about it.

As for PC users, the term "phishing" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference.

Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers.

Dangerous Scams

A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website.

Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email? Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones.

Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information.

It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively.

Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability.

However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget the advice which they all are likely to have learned by heart:

  • Never follow a link in an email, if it claims to be from a financial institution
  • Never open an attachment if the email is from somebody you don't know
  • Protect your PC from malware
  • Stay on the alert

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.

The company's R&D department created an innovative technology, which disables information-stealing programs. Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

WIRED

The TSA Is Testing New Scanners to Make Airport Security More ...
WIRED
US airports are starting trials of new CT scanners that will let TSA agents virtually unpack bags, keeping everyone safe and on the move.
TSA is testing new scanners that make security line faster - Business ...Business Insider

all 3 news articles »

Department of Defense

Marshall Center Hosts Security Policy Seminar for Romanian Parliamentarians
Department of Defense
Dorel Caprar, chairman of the Defense, Public Order and National Security Committee of the Chamber of Deputies of Romania, asks a question, Nov. 16, 2017, during a tailored seminar on security policy for 13 Romanian parliamentarians held Nov. 16-17 at ...

and more »

ABC News

TripAdvisor accused of censoring posts about security concerns
ABC News
Back now with new questions about the popular website TripAdvisor. And whether they censured posts warning them about potential dangers coming before cyber Monday when 27% more hotel rooms are booked than any other day of the year and ABC's gio ...

and more »

French parliament plans investigation into nuclear security
Reuters
Barbara Pompili, the head of the parliament's sustainable development committee and a member of centrist President Emmanuel Macron's LREM party, told reporters on Wednesday that an investigation into nuclear security would be launched before the end ...

and more »

Voice of America

Security Tight for Thanksgiving Parade in Terror-wary New York City
Voice of America
This year's security plan includes dozens of city sanitation trucks, which weigh about 16 tons empty and up to twice that with sand, that will be lined up as imposing barriers to traffic at every cross street along the parade route stretching from ...
Tight Security In Place For Macy's Thanksgiving Day Parade Balloon InflationCBS New York
Security Tight for Thanksgiving Parade in Terror-Wary NYCU.S. News & World Report
Security beefed up for Macy's Thanksgiving Day Parade, balloon inflationWABC-TV

all 330 news articles »

FRANCE 24

France calls UN Security Council meeting over Libya slave auctions
FRANCE 24
France on Wednesday called an emergency meeting of the UN Security Council over slave-trading in Libya as President Emmanuel Macron blasted the auctioning of Africans as a crime against humanity. "France decided this morning to ask for an urgent ...
France calls UN Security Council emergency meeting over Libya slave-tradingDeutsche Welle
France calls UN Security Council meeting over Libya slaveryGeo News, Pakistan

all 109 news articles »

Fox News

Uber slammed by security experts over data breach that exposed data on 57 million customers
Fox News
The names and driver's license numbers of around 600,000 drivers in the U.S. were also accessed. External forensics experts brought in by Uber have found no evidence that trip location history, credit card numbers, bank account numbers, Social Security ...
Uber hid a security breach affecting 57 million customers' dataTNW
Uber Security Breach Exposed Personal Data Of 57 Million Customers And DriversJalopnik
Uber suffered massive data breach, then paid hackers to keep quietNaked Security
Bloomberg -WIRED -CNBC
all 668 news articles »

Bloomberg

Victoria's Secret Meets China's Security
Bloomberg
Despite having previously hosted the likes of Justin Bieber and the Rolling Stones without much incident, Chinese authorities scrutinized television crews trying to film promos outside Shanghai's Mercedes-Benz Arena as though they were national ...

and more »

BBC News

Tbilisi gunfire as Georgia security forces mount siege
BBC News
Explosions and gunfire have broken out in the Georgian capital Tbilisi as counter-terrorism forces lay siege to a block of flats where suspected militants are holed up. The security service said several members of a "terrorist group" had refused to ...
Georgian policeman, three terrorism suspects killed in police operation - state securityeuronews

all 39 news articles »
Google News

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More