Programmers Arena: 5 CYBER CRIME--Part 5 Crime 5

5 CYBER CRIME--Part 5 Crime 5



Fifth crime ---> Phishing

This crime takes in the confidential information of a personsuch as credit card numbers username-password combos by masquerading as alegitimate enterprise. Phishing [NOTE: Not to be confused with fishing] istypically carried out by email spoofing. Many of you might have received emailscontaining links to legitimate appearing websites. You probably found itsuspicious and didn’t click on it, smart move…….maybe not because hardly anyoneclicks on the links but the person who does puts his private information onrisk of being stolen by a single click. Cyber-Criminals use social engineeringto trick you into downloading malware off the internet or make you fill in yourpersonal information under false pretenses.

A Phishing scam in an email can be evaded by keeping certainthings in mindà

  1. Look for spelling mistakes in the text. Cyber-Criminals are not recognized as good writers.
  2. Move your cursor to the given link but don’t click it .Check if the address [URL] matches with the one in the message
  3. Keep your eyes open for fake threats. Criminals might threaten you that your security has been compromised.
  4. Criminals use the names, logos, graphics and web addresses look strikingly similar but all they lead you to is some stupid, phoney site.

And like the last crime DoS thiscrime also has a variation its known as Vishing [Voice Phishing] involves callsto victims using fake identity fooling you to consider the call is from atrusted organization.

No comments:

Post a Comment

Copyright © Programmers Arena