The Hazards of Phishing


by jaya sinha - Date: 2008-08-29 - Word Count: 566 Share This!

 


The word "phishing'' was coined by hackers who used this method for illicit purposes to the order of luring people to get their bank passwords, credit card number etc. The sites or the email identity used by these hackers seem to be so authentic that an internet user gets lured and commits an erroneous act. The hackers who commit these fraudulent acts generally also incorporate official logos on their websites such that they seem to be from real organizations.

Ken Haywood is the latest example of a user whose computer was hacked and email address was used by terrorists just before the recent bomb blasts. He was put into such a miserable situation that all his contact details were removed from his employer's website so that no problems could be posed further.

No doubt, phishers have been engaging in foul play for malicious reasons ranging from money laundering to terror campaigns. And there has been an increase in the phishing messages of 18-20 % over the last few years. The phisher can attack an individual or even an organization which is then referred to as "spear phishing".

Even the online auction and shopping website ebay was once hacked by phishers some time back in 2003, when the users were directed to click at the link they were being provided or else their account would soon be suspended. Users then clicked on to update their information and subsequently also revealed their credit card number and password.

Even an organization like AOL were subjected to hacking which resulted in stringent policies being enforced therein with prompt system development to ensure deactivation of the victim's accounts.

With phishers using images these days instead of texts, it has become tougher for the users to detect the unwanted or spam mails even after the use of anti-phishing filters.

Here are some tips to avoid the Internet scam known as either cyber crime or phishing.

-Get trained: Since ignorance is a bliss, the best strategy which can be used to overcome phishing is to train and educate the users about the phishing attacks. The best method in this regard is to improve the individual browsing habits. One should always check for the company's address before clicking on the hyperlinks in the sent email message. The genuine companies will always have some kind of unique information accessible only to users.
-Always verify before any financial transaction: The financial transaction you may undertake online must always be checked before you may the final payment. You should check for the icon which should lock your transaction so that you are completely secure.
-Check before sending any confidential information: Whenever you receive an email asking for your personal information, check before you do so. You may get number of spam mails which confirms you to be a winner of lottery. Do not get carried away. You can put up your grievances and complaints regarding these mails to the government to where the sender belongs.
-Update your computer with anti-spam and anti-phishing tools: These tools will avoid the entry of spam mails and also protect your system form viruses. The spam filters when used will bring about a substantial reduction in the number of phishing e-mails.With such tools in progress, tools commonly used for phishing as "pharming" and "malware" will be rendered futile.

The above techniques will surely help you to get rid of phishing which made you have sleepless nights.


Related Tags: array cybercrime, anti-spam, anti-phishing, ken haywood, hacked computer, hazards of phishing

Your Article Search Directory : Find in Articles

© The article above is copyrighted by it's author. You're allowed to distribute this work according to the Creative Commons Attribution-NoDerivs license.
 

Recent articles in this category:



Most viewed articles in this category: