Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing > NetSparsh - Viral Content you Love & Share

Phishing

Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.

Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords.

Usually after getting an email like the ones mentioned above from reputable companies, most of us would race to respond as quickly as possible. However, in most cases you will find that you won't be helping anyone other then the criminal who wrote that email and who has nothing to do with the actual organizations.

What is Phishing?

It is when someone creates false email that pretends to be from a bank or other authority, but which is actually designed to collect sensitive information such as passwords. This process of stealing information used for fraudulent purposes is the latest problem to plague Internet users. It is a phenomenon know as phishing i.e. emails 'fishing' for important information.

Just like Spam, phishing mails are sent to the widest possible audience so it's not unusual to receive a message asking you to confirm account details from an organization you do not actually deal with. You may be asked to fix up your eBay account when you haven't even got one!

In addition to collecting sensitive information many phishing messages try to install spy ware, Trojans etc. allowing hackers to gain backdoor entry into computers.

Types of Phishing Emails:

Some phishing emails ask for a response by email.

Some emails include a form for collecting details that you are told to fill out.

Some even include a link to a web site that resembles the actual site you expect to visit, but is actually a clone of the original site.

Number of active phishing sites reported in March, 2005: 2870

Number of brands hijacked by phishing campaigns: 78

Contains some form of target name in URL: 31%

Country hosting the most number of phishing sites: United States of America

Source: http://www.antiphishing.org

Phishing attacks can be really sophisticated. Some time ago a flaw in Internet Explorer allowed hackers to display a false address while redirecting the user to an entirely different site making it almost impossible to distinguish a phishing attack from a legitimate email.

Possible solutions:

New technologies can provide a better means of countering phishers. One option being explored by a lot of banks is the use of a secure token, a small electronic gadget that generates a unique password to be entered each time a user logs onto the web site. This would make a phishing attack useless because without the physical possession of a token it is impossible to access the account. This approach is somewhat similar to what is used at Automated Teller Machines around the world where you need to have both the card and the Pin number in order to use the machine.

One option is to use a technology popularly knows as PassMarks that effectively acts as a second password. After entering the user name a unique image pre selected by the user is displayed before s/he is asked for the password. If the proper image is not displayed the user will come to know that s/he is not on the authentic site. Another option that a lot of organizations are exploring is using text messages instead of email messages. Text messages cost money to send, so Spammers are less likely to partake in the process making it easier to distinguish between legitimate messages and fakes.

Ashish Jain
M6.Net Web Helpers
http://www.m6.net

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

CSO Online

6 essential elements of edge computing security
CSO Online
“If you're responsible for asset management, you need to account for your IT assets across the company, whether these assets come in through IT or end user areas,” says Mike Raggo, CSO at 802Secure, which specializes in IoT security. “If you don't do ...

and more »

TNW

Survey: 45% of security professionals reuse the same password
TNW
There's a saying — “practice what you preach.” If you give advice, make sure it's something you follow personally. Turns out, some security pros aren't doing that. A survey of 306 infosec professionals at London's Infosecurity Conference 2008 from ...


Fox News

Robot security guard patrols San Francisco gas station | Fox News
Fox News
Robots are popping up at corporations, campuses, shopping malls and airports.

and more »

ZDNet

​ATO removes 'bug' preventing use of website with security measures in place
ZDNet
After it was revealed earlier this month that the Australian Taxation Office (ATO) was preventing users from accessing its website if certain adblockers, firewalls, and anti-virus software was in place, the government entity has removed a "bug" it said ...

and more »

WOODTV.com

GRPD launching security camera database - WOODTV.com
WOODTV.com
Michael Wright was wrapping up a long day of work in the early morning hours of June 30 when something caught his attention.
Homeowner and business security camera help solve crimes, GRPD says of new databaseWZZM13.com

all 3 news articles »

Cloud Security: Lessons Learned from Intrusion Prevention Systems
Dark Reading
I recently had the opportunity to brief an industry analyst on the rapid advancement of artificial intelligence (AI) in solving public cloud security. Both the analyst and I had navigated the inception and commercialization of intrusion prevention ...


Travel+Leisure

This Best-selling Home Security Camera With Over 13K Rave Reviews Is on Sale for Amazon Prime Day
Travel+Leisure
If you thought Prime Day was over, think again. Amazon's biggest sale event of the year doesn't end until Wednesday morning at 2:59 a.m. ET, so you can still stock up on deals if you missed out on Monday (or if you're coming back for seconds).

and more »

Farmington plans to install downtown security cameras
Kennebec Journal & Morning Sentinel
FARMINGTON — The town is moving ahead with plans to install downtown security cameras that would cover major municipal parking lots, intersections and downtown businesses and assist in police investigations of crimes. The downtown TIF advisory ...

Google News

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More