URI:
   DIR Return Create A Forum - Home
       ---------------------------------------------------------
       gworld
  HTML https://gworld.createaforum.com
       ---------------------------------------------------------
       *****************************************************
   DIR Return to: MUST KNOW
       *****************************************************
       #Post#: 328--------------------------------------------------
       phishing introduction
       By: eba95 Date: August 5, 2010, 6:42 am
       ---------------------------------------------------------
       uppose you check
       your e-mail one day
       and find a message
       from your bank.
       You've gotten e-mail
       from them before, but
       this one seems
       suspicious, especially
       since it threatens to
       close your account if
       you don't reply
       immediately. What do
       you do?
       This message and
       others like it are
       examples of phishing,
       a method of online
       identity theft. In
       addition to stealing
       personal and financial
       data, phishers can
       infect computers with
       viruses and convince
       people to participate
       unwittingly in money laundering.
       Most people associate phishing with
       e-mail messages that spoof, or
       mimic, banks, credit card companies
       or other business like Amazon and
       eBay. These messages look authentic
       and attempt to get victims to reveal
       their personal information. But e-
       mail messages are only one small
       piece of a phishing scam.
       From beginning to end, the process
       involves:
       1. Planning. Phishers decide which
       business to target and determine
       how to get e-mail addresses for the
       customers of that business. They
       often use the same mass-mailing
       and address collection techniques as
       spammers.
       2. Setup. Once they know which
       business to spoof and who their
       victims are, phishers create methods
       for delivering the message and
       collecting the data. Most often, this
       involves e-mail addresses and a Web
       page.
       3. Attack. This is the step people are
       most familiar with -- the phisher
       sends a phony message that appears
       to be from a reputable source.
       4. Collection. Phishers record the
       information victims enter into Web
       pages or popup windows.
       5. Identity Theft and Fraud. The
       phishers use the information they've
       gathered to make illegal purchases
       or otherwise commit fraud. As many
       as a fourth of the victims never fully
       recover [
       *****************************************************