Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing > NetSparsh - Viral Content you Love & Share

Phishing

Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.

Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords.

Usually after getting an email like the ones mentioned above from reputable companies, most of us would race to respond as quickly as possible. However, in most cases you will find that you won't be helping anyone other then the criminal who wrote that email and who has nothing to do with the actual organizations.

What is Phishing?

It is when someone creates false email that pretends to be from a bank or other authority, but which is actually designed to collect sensitive information such as passwords. This process of stealing information used for fraudulent purposes is the latest problem to plague Internet users. It is a phenomenon know as phishing i.e. emails 'fishing' for important information.

Just like Spam, phishing mails are sent to the widest possible audience so it's not unusual to receive a message asking you to confirm account details from an organization you do not actually deal with. You may be asked to fix up your eBay account when you haven't even got one!

In addition to collecting sensitive information many phishing messages try to install spy ware, Trojans etc. allowing hackers to gain backdoor entry into computers.

Types of Phishing Emails:

Some phishing emails ask for a response by email.

Some emails include a form for collecting details that you are told to fill out.

Some even include a link to a web site that resembles the actual site you expect to visit, but is actually a clone of the original site.

Number of active phishing sites reported in March, 2005: 2870

Number of brands hijacked by phishing campaigns: 78

Contains some form of target name in URL: 31%

Country hosting the most number of phishing sites: United States of America

Source: http://www.antiphishing.org

Phishing attacks can be really sophisticated. Some time ago a flaw in Internet Explorer allowed hackers to display a false address while redirecting the user to an entirely different site making it almost impossible to distinguish a phishing attack from a legitimate email.

Possible solutions:

New technologies can provide a better means of countering phishers. One option being explored by a lot of banks is the use of a secure token, a small electronic gadget that generates a unique password to be entered each time a user logs onto the web site. This would make a phishing attack useless because without the physical possession of a token it is impossible to access the account. This approach is somewhat similar to what is used at Automated Teller Machines around the world where you need to have both the card and the Pin number in order to use the machine.

One option is to use a technology popularly knows as PassMarks that effectively acts as a second password. After entering the user name a unique image pre selected by the user is displayed before s/he is asked for the password. If the proper image is not displayed the user will come to know that s/he is not on the authentic site. Another option that a lot of organizations are exploring is using text messages instead of email messages. Text messages cost money to send, so Spammers are less likely to partake in the process making it easier to distinguish between legitimate messages and fakes.

Ashish Jain
M6.Net Web Helpers
http://www.m6.net

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

WIRED

A Twitter DM Fail, Free Credit Freezes, and More Security News This ...
WIRED
This week, President Donald Trump threatened to declassify swaths of information related to the ongoing Russian interference investigation, with seemingly little ...
Twitter squashes security bug leaking direct messages since 2017Digital Trends

all 13 news articles »

Fox News

Police beef up security for UN gathering, Trump visit
Fox News
The security arsenal features police boats patrolling the East River near the U.N., aviation units overhead and teams of officers trained to respond to chemical, biological and other potential terror threats. About 50 city Department of Sanitation dump ...

and more »

CNET

5 new Alexa security tricks to watch over your smart home
CNET
Alexa-enabled security cameras from Ring, Arlo and August, along with Amazon's own Cloud Cam indoor security camera, are getting the capability to work with the Amazon Cameras Recap API. This API allows you to view recorded video clips by saying, ...
Amazon Smart Plug | works with Amazon Alexa - Amazon.comAmazon.com
Facebook's 'Portal' Video Chat Device to Be Announced Next WeekCheddar
Facebook Dives into Home Device Market with Video Chat Product Named "Portal"Cheddar

all 222 news articles »

New York Times

Billionaire Backer of Maria Butina Had Russian Security Ties - The ...
New York Times
Konstantin Nikolaev, the oligarch who helped finance Ms. Butina, has been an investor in projects linked to the Russian government.

and more »

Reuters

Iran's Rouhani orders security forces to identify parade attackers: ISNA
Reuters
DUBAI (Reuters) - Iranian President Hassan Rouhani ordered the country's security forces to identify those reponsible for an attack on Saturday on a military parade, the semi-official ISNA news agency said. Iranian President Hassan Rouhani delivers a ...


HuffPost

Homeland Security Orders FEMA Boss To Pay For Personal Use Of Government Vehicles
HuffPost
Homeland Security Secretary Kirstjen Nielsen has ordered Federal Emergency Management Agency Administrator Brock Long to reimburse the government for improper personal use of official vehicles, which was uncovered in an investigation. But he won't ...

and more »

The Journal News | LoHud.com

New Rochelle to re-release security audit with fewer redactions
The Journal News | LoHud.com
The New Rochelle school district is re-releasing an audit on school security, two weeks after The Journal News/lohud reported on the heavily-redacted contents of the district's initial public report. The new report will include fewer redactions ...


Council on Foreign Relations (blog)

CFR Digital Interactive Explores Women's Contributions to Peace and Security
Council on Foreign Relations (blog)
While recurrent armed conflicts, expanded extremist networks, and record levels of displacement remain defining features of global security, standard peacemaking methods continue to overlook a proven strategy to reduce conflict and advance stability ...

and more »

NPR

Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes ...
NPR
Heading into midterm elections, pressure is on for governments and campaigns to secure elections. But what about the companies that make the machines and ...
Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny89.3 KPCC
Indictment - Department of JusticeDepartment of Justice
Tensions Flare as Hackers Root Out Flaws in Voting MachinesWall Street Journal
The Intercept -Center for Internet Security -YouTube
all 117 news articles »

WIRED

Cloudflare Embraces Google Roughtime, Giving Internet Security a ...
WIRED
Cryptography schemes are complicated to understand and implement. A lot of things can go wrong. But when it comes to web encryption, a surprising number ...

and more »
Google News

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More