| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Social distancing? Try a better way to work remotely on your online files. Dokkio, a new product from PBworks, can help your team find, organize, and collaborate on your Drive, Gmail, Dropbox, Box, and Slack files. Sign up for free.

View
 

phishing

Page history last edited by tcsh36@mst.edu 9 years, 7 months ago

Brief Explanation:

The term phishing was first described in the year 1986 and first officially coined in the year 1996. It refers to the illicit digging of the sensitive personal information from unknown individuals. This information usually contains important data such as bank username and password or other such details through which the hacker can get access to the individual accounts. Hacker then ´╗┐has the control over these accounts and thus the resources present in them for his ow personal use.

The process will usually start with a mail or sometimes even a call form a hacker. This communication will usually have a sense of urgency associated with it. An example of this would be like a mail saying something about the bank account been deactivated. It will urge the recipient to provide his username and password for its activation. If the user provides this information, then it will directly be sent to the hacker. The hacker can then use this information for entering the account and withdraw money or other such actions of personal interests.

Media:

Please go through the following link for having a clearer idea

http://www.youtube.com/watch?v=7MtYVSGe1ME

 

Question:

Discuss the ways in which you can you can save yourself from being a victim of phishing.

Comments (1)

tcsh36@mst.edu said

at 1:11 pm on Oct 23, 2010

You don't have permission to comment on this page.