The Hazards of Phishing
The word "phishing'' was coined by hackers who used this method for illicit purposes to the order of luring people to get their bank passwords, credit card number etc. The sites or the email identity used by these hackers seem to be so authentic that an internet user gets lured and commits an erroneous act. The hackers who commit these fraudulent acts generally also incorporate official logos on their websites such that they seem to be from real organizations.
Ken Haywood is the latest example of a user whose computer was hacked and email address was used by terrorists just before the recent bomb blasts. He was put into such a miserable situation that all his contact details were removed from his employer's website so that no problems could be posed further.
No doubt, phishers have been engaging in foul play for malicious reasons ranging from money laundering to terror campaigns. And there has been an increase in the phishing messages of 18-20 % over the last few years. The phisher can attack an individual or even an organization which is then referred to as "spear phishing".
Even the online auction and shopping website ebay was once hacked by phishers some time back in 2003, when the users were directed to click at the link they were being provided or else their account would soon be suspended. Users then clicked on to update their information and subsequently also revealed their credit card number and password.
Even an organization like AOL were subjected to hacking which resulted in stringent policies being enforced therein with prompt system development to ensure deactivation of the victim's accounts.
With phishers using images these days instead of texts, it has become tougher for the users to detect the unwanted or spam mails even after the use of anti-phishing filters.
Here are some tips to avoid the Internet scam known as either cyber crime or phishing.
-Get trained: Since ignorance is a bliss, the best strategy which can be used to overcome phishing is to train and educate the users about the phishing attacks. The best method in this regard is to improve the individual browsing habits. One should always check for the company's address before clicking on the hyperlinks in the sent email message. The genuine companies will always have some kind of unique information accessible only to users.
-Always verify before any financial transaction: The financial transaction you may undertake online must always be checked before you may the final payment. You should check for the icon which should lock your transaction so that you are completely secure.
-Check before sending any confidential information: Whenever you receive an email asking for your personal information, check before you do so. You may get number of spam mails which confirms you to be a winner of lottery. Do not get carried away. You can put up your grievances and complaints regarding these mails to the government to where the sender belongs.
-Update your computer with anti-spam and anti-phishing tools: These tools will avoid the entry of spam mails and also protect your system form viruses. The spam filters when used will bring about a substantial reduction in the number of phishing e-mails.With such tools in progress, tools commonly used for phishing as "pharming" and "malware" will be rendered futile.
The above techniques will surely help you to get rid of phishing which made you have sleepless nights.
Related Tags: array cybercrime, anti-spam, anti-phishing, ken haywood, hacked computer, hazards of phishing
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Offshore it Consulting Services India
Cost effectiveness of productions offers a cutting edge in this age of stiff competition. Lower is - Geeks Who?
Geeks are characterized by the tools they use. What all one should have to qualify to be called gee - Now Wi-fi (vi-fi) in Vehicles
This is a Wi-Fi age. Those who need can find Wi-Fi hotspots everywhere; in home, hotels, airport lo - How Web Development Can Catalyze Your Profit Prospective?
Website is the heart and soul of an online business. It depicts the appearance of your products, se - Free Cisco Ccna, Ccnp, Ccent Tutorial on Switching, Spanning-tree Protocol (stp)
A Layer 2 switch, which functions as a transparent bridge, offers no additional links for redundanc - Windows Vista Sidebar, Gadgets, Easy Wireless Networking and Improved Back Features
Microsoft has tried to put "active" items on the Windows desktop for nearly a decade. Finally, with - Windows Vista Features and Upgrading the Windows Vista Versions
Microsoft Windows Vista is the latest workstation version of the Windows operating system and is de - Comptia A+, Network+ Certification Tutorial - Function of Network Hubs
A hub is a device used to connect all of the computers on a star or ring network. A hub is nothing - Tips for Unlock Iphone 3G
Anybody who owns an iPhone wants to have it unlocked and they need unlock iPhone 3G tips, in genera - Unlock Iphone Tutorial
Most of the people consider that it is difficult to unlock iPhone, but in fact, this process is eas
Most viewed articles in this category:
- It Consulting - Buyer Fraud Prevention
Hiring the wrong computer consultant is not only frustrating, but it can also leave you cheated of y - San Francisco Web Design and Web Development Services
A San Francisco Web Development and Web Design Services, #10 offers a full range of marketing and we - Complex Issues, Comprehensive Solutions by Freelance Providers
As business increases, customers are most certainly asking for their share of higher business value, - Gaming and Graphic Design Computer Monitor Solutions
CRT screens are fast moving towards obsolescence and are now almost the preserve of Graphic designer - Help Wanted - One New Customer for Growing IT Business
Your computer services business is the same, you need customers. But do you need as many as you thin - What Does it Take to be a Top IT Manager Today
Well-Run Concepts has been conducting research on how we can quantify what personal skills or compet - What Are Hosted Applications?
As access to the Internet becomes more widespread with faster, more reliable and 'always on' connect - Password Security
In the past I've never really paid much attention to security issues when it comes to user names and - General Computer Maintenance For The Masses
Reorganizing the file systemGo to “Start” > “Run” > Type in “def - How Does Human Resource Management in the Workspace Effect Me?
How often do you find yourself saying: "I wish I knew how to learn more about this topic" Well, w