Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing > NetSparsh - Viral Content you Love & Share

Phishing

Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.

Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords.

Usually after getting an email like the ones mentioned above from reputable companies, most of us would race to respond as quickly as possible. However, in most cases you will find that you won't be helping anyone other then the criminal who wrote that email and who has nothing to do with the actual organizations.

What is Phishing?

It is when someone creates false email that pretends to be from a bank or other authority, but which is actually designed to collect sensitive information such as passwords. This process of stealing information used for fraudulent purposes is the latest problem to plague Internet users. It is a phenomenon know as phishing i.e. emails 'fishing' for important information.

Just like Spam, phishing mails are sent to the widest possible audience so it's not unusual to receive a message asking you to confirm account details from an organization you do not actually deal with. You may be asked to fix up your eBay account when you haven't even got one!

In addition to collecting sensitive information many phishing messages try to install spy ware, Trojans etc. allowing hackers to gain backdoor entry into computers.

Types of Phishing Emails:

Some phishing emails ask for a response by email.

Some emails include a form for collecting details that you are told to fill out.

Some even include a link to a web site that resembles the actual site you expect to visit, but is actually a clone of the original site.

Number of active phishing sites reported in March, 2005: 2870

Number of brands hijacked by phishing campaigns: 78

Contains some form of target name in URL: 31%

Country hosting the most number of phishing sites: United States of America

Source: http://www.antiphishing.org

Phishing attacks can be really sophisticated. Some time ago a flaw in Internet Explorer allowed hackers to display a false address while redirecting the user to an entirely different site making it almost impossible to distinguish a phishing attack from a legitimate email.

Possible solutions:

New technologies can provide a better means of countering phishers. One option being explored by a lot of banks is the use of a secure token, a small electronic gadget that generates a unique password to be entered each time a user logs onto the web site. This would make a phishing attack useless because without the physical possession of a token it is impossible to access the account. This approach is somewhat similar to what is used at Automated Teller Machines around the world where you need to have both the card and the Pin number in order to use the machine.

One option is to use a technology popularly knows as PassMarks that effectively acts as a second password. After entering the user name a unique image pre selected by the user is displayed before s/he is asked for the password. If the proper image is not displayed the user will come to know that s/he is not on the authentic site. Another option that a lot of organizations are exploring is using text messages instead of email messages. Text messages cost money to send, so Spammers are less likely to partake in the process making it easier to distinguish between legitimate messages and fakes.

Ashish Jain
M6.Net Web Helpers
http://www.m6.net

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

WIRED

The TSA Is Testing New Scanners to Make Airport Security More ...
WIRED
US airports are starting trials of new CT scanners that will let TSA agents virtually unpack bags, keeping everyone safe and on the move.
TSA is testing new scanners that make security line faster - Business ...Business Insider

all 3 news articles »

Department of Defense

Marshall Center Hosts Security Policy Seminar for Romanian Parliamentarians
Department of Defense
Dorel Caprar, chairman of the Defense, Public Order and National Security Committee of the Chamber of Deputies of Romania, asks a question, Nov. 16, 2017, during a tailored seminar on security policy for 13 Romanian parliamentarians held Nov. 16-17 at ...

and more »

ABC News

TripAdvisor accused of censoring posts about security concerns
ABC News
Back now with new questions about the popular website TripAdvisor. And whether they censured posts warning them about potential dangers coming before cyber Monday when 27% more hotel rooms are booked than any other day of the year and ABC's gio ...

and more »

French parliament plans investigation into nuclear security
Reuters
Barbara Pompili, the head of the parliament's sustainable development committee and a member of centrist President Emmanuel Macron's LREM party, told reporters on Wednesday that an investigation into nuclear security would be launched before the end ...

and more »

Voice of America

Security Tight for Thanksgiving Parade in Terror-wary New York City
Voice of America
This year's security plan includes dozens of city sanitation trucks, which weigh about 16 tons empty and up to twice that with sand, that will be lined up as imposing barriers to traffic at every cross street along the parade route stretching from ...
Tight Security In Place For Macy's Thanksgiving Day Parade Balloon InflationCBS New York
Security Tight for Thanksgiving Parade in Terror-Wary NYCU.S. News & World Report
Security beefed up for Macy's Thanksgiving Day Parade, balloon inflationWABC-TV

all 330 news articles »

FRANCE 24

France calls UN Security Council meeting over Libya slave auctions
FRANCE 24
France on Wednesday called an emergency meeting of the UN Security Council over slave-trading in Libya as President Emmanuel Macron blasted the auctioning of Africans as a crime against humanity. "France decided this morning to ask for an urgent ...
France calls UN Security Council emergency meeting over Libya slave-tradingDeutsche Welle
France calls UN Security Council meeting over Libya slaveryGeo News, Pakistan

all 109 news articles »

Fox News

Uber slammed by security experts over data breach that exposed data on 57 million customers
Fox News
The names and driver's license numbers of around 600,000 drivers in the U.S. were also accessed. External forensics experts brought in by Uber have found no evidence that trip location history, credit card numbers, bank account numbers, Social Security ...
Uber hid a security breach affecting 57 million customers' dataTNW
Uber Security Breach Exposed Personal Data Of 57 Million Customers And DriversJalopnik
Uber suffered massive data breach, then paid hackers to keep quietNaked Security
Bloomberg -WIRED -CNBC
all 668 news articles »

Bloomberg

Victoria's Secret Meets China's Security
Bloomberg
Despite having previously hosted the likes of Justin Bieber and the Rolling Stones without much incident, Chinese authorities scrutinized television crews trying to film promos outside Shanghai's Mercedes-Benz Arena as though they were national ...

and more »

BBC News

Tbilisi gunfire as Georgia security forces mount siege
BBC News
Explosions and gunfire have broken out in the Georgian capital Tbilisi as counter-terrorism forces lay siege to a block of flats where suspected militants are holed up. The security service said several members of a "terrorist group" had refused to ...
Georgian policeman, three terrorism suspects killed in police operation - state securityeuronews

all 39 news articles »
Google News

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More