How to Identify Phishing (pronounced fishing) Attacks ??

Phishing (pronounced fishing) is a process which entices you to give out personal information by using electronic communication technique such as emails, masquerading to be from a legitimate source. Phishing is one of the fastest rising online crime method used for stealing personal information. Basically a phishing email attempts to obtain valuable information such as your.

  • ATM /credit card number
  •  Bank account number 
  • Social security number etc
The stolen information could be used for carrying out identity thefts or stealing money from your bank account. Identity theft means that the cracker could disguise as the one whose information he has obtained and carry out various activities in their name.

Phishing emails – Emails masqueraded as from a legitimate source is sent to the victim most probably asking for the details mentioned earlier.


Phishing websites – Websites that look similar to genuine companies or banks are setup that could mislead the victim into entering important details such as the username and password.

Phishing phone calls – Calls are made to the victims in the name of a bank or similar institution. The victim is made to enter or tell confidential data such as PIN number.





  • Characteristics of Phishing attacks. 
  • Following are some of the characteristics generally associated with a phishing email or website.


    1. Request for submitting personal information – most companies do not ask their customers to submit confidential data via emails. So if you find an email asking for your credit card number there is high probability that it is a phishing attempt.
    2.  Sense of urgency – most phishing emails demand immediate action. Emails saying your account will be deactivated in a day if you don’t enter your credit card number is an example. 
    3. Generic salutation – phishing emails generally star with Dear customer instead of the user’s name. 
    4. Attachments – Phishing emails might also have attachments with them which will mostly contain malware.
    5.  Phony links – the links might show something else but will actually direct to a different location. Phishing mails use various methods to hide the actual URLs. 
    • The link that is displayed will be an image while the actual link could be different.
    •  Actual links can be masked using HTML. Thus the text displayed will be http://websitename.com/ while the hyperlink set will be http://www.othersite.com.
    •  Another method is by using @ in the link. If a link contains the ‘@’ sign, the URL you’re taken to will be the one after the ‘@’ sign. For example, if the link is www.microsoft.com/windows@web.com/?=true, the actual URL you will be taken to is web.com?=true. 
    • Links with numbers instead of website name. Example: www.182.11.22.2.com NB: 
    • To see the URL, just hover your mouse over the link (but don’t click) and the link will be displayed. 
    • Bad grammar and/or spelling – There’s a good chance that phishing mails might contain bad grammar and spelling mistakes. 
    • Phishing websites might look exactly like the original ones but their URL might be slightly or completely different. Hence make sure that the URL is the correct one when you visit a website.
    •  Also legitimate websites use SSL for protecting your information when entering your data. Make sure that the URL starts with https:// instead of http:// for pages where you have to submit username/password or other private information.


    FOLLOW THE BELOW RULES TO BE SAFE!!

    1. If you find a mail suspicious, do not click its URLs or download attachments. 
    2. Do not reply to suspicious emails with your personal information. 
    3. Use a browser that comes with phishing protection such as the latest versions of IE, Firefox, Opera, Chrome etc. 
    4. They come with blacklists of known phishing sites that are updated regularly and if you happen to visit any of these sites, they will alert you. 
    5. Use a good up to date anti-virus. 
    6. And of course take use of your Email provider’s spam filters.
    Share this article :
     
    Copyright © 2011. Wallpapers, Film News ,Tech News ,E materials - All Rights Reserved.
    Pictures Powered by Pics9.net| vinodham | Tolly2day