Skip to main content

What is Phishing ? | The Basics Course About Phishing


 hello to all my friendz .After my post How To Delete Anyone Profile From your Facebook Account Today I am learning you . what is phising ? it's basic course about phising . by this easy way you can hack any facebook account . i think mostly guys didn't about this . so don't worry . you can learn here about phising .

 
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used.



Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.

Techniques Behind A Phishing Attack

1. Link Manipulation

Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

2. Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.

How does a phishing attack/scam look like?

As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like


Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.

To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.

These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.

How To Identify A Fraudulent E-mail?

Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”

Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail. 
“If you don’t respond within 48 hours, your account will be closed.”

These messages convey a sense of urgency so that you’ll respond immediately without thinking. 
“Dear Valued Customer.”

Phishing e-mail messages are usually sent out in bulk andoften do not contain your first or last name. 
“Click the link below to gain access to your account.”

HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of areal company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.

So The Bottom Line To Defend From Phishing Attack Is

1. Never assume that an email is valid based on the sender’s email address.
2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal
    email.
3. An email from trusted organization will never contain attachments or software.
4. Clicking on a link in an email is the most insecure way to get to your account

Comments

Popular posts from this blog

Digital Marketing

Digital Marketing is promoting brands through social media, Internet, Television, Radio, search marketing optimization and more Following the phenomenal success of social, internet and mobile marketing in the last few years, the Digital industry has grown by leaps and bounds in India. Globally, it has witnessed a surge of around $40 billion and is spiraling here too. Big and small brands have not only understood the power of social media but in fact have reached  nirvana  in effectively putting their message across to consumers. If you happen to be reading this and only faintly know about this form of advertising, then welcome to the Digital party as we explain the power of this practical medium. What is Digital Marketing? Simply put, to use all forms of digital advertising channels to promote a brand is what digital marketingis all about. These channels include television, radio and internet among others. Advertising through mobile phones, SMS / MMS / digital outdoo...

We Have Available Total 120 Crore Indian Mobile & Email Database Updated Before 2 Month.

All INDIA Updated Mobile Database. Price For Database. Rs. 1100/-      For Any 1 Indian City. Rs. 1600/-    For Any 1 Indian State. Need All INDIA  Mobile  Database ? Contact us @ 09698923614. # Upto 120 Crore All INDIA Mobile Database. # Covered By 32 State , 300 Cities , 1000 + Categories and Many More. # We Will Provide 20 GB Database in 4 DVD's of All Mobile Database in Excel & .txt Format. # With Individual Record: Company Name, Contact Person, Mobile Number, Landline Number, Email Address,Number of Employees, Total Turn over, State, City, Pin Code, Address. How To Database Reach To You ?   You Will Get DVD's From Courier Service Free Home Delivery In 2 Business Days(Any Where in India).  We wi ll prov id e you Docket No. of courier you can track online the Status of your courier order .     ...

ID Generation Process Home and Center Based

PROJECT HIGHLIGHTS: Project:  Data typing work into online software provided. the centre will be getting jpeg image from online server  which they need to enter by typing into the  automated software provided. Seats:  Minimum Seats Required to inititate the process is 1-50 seats per shift. Workload:  Unlimited Workload Submission: work will be submitted directly into portal. the centre will get daily report and reporting excel format will be provided Payout: The Centre will be paid on the basis of 1.5 usd per hour depending upon thier performance. it is a completely pay per performance campaign in which the centre can also earn payout upto 4 usd per log in hour.. Note: An average payout per seat per shift varies from 12k to 15k per shift.the centre can also earn upto 25k per shift depending upon the efforts put by the centre.  Billing: Centre Will Be Paid Daily Or Weekly As Per Centre Wish Training:  Provided Online. Id ...