Phishing: Examples and its prevention methods

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by concealing as a trustworthy entity in an electronic communication.



It is usually done by sending fake emails and redirecting unsuspecting users by using fake websites which the URL will use legitimate form like email address, logos and link of reputable business such as SunTrust, eBay, Citibank, Chapter One Bank, PayPal and IRS Tax Refund in the message.



The examples of phishing scam are as follows:

Ebay


Trusted Bank


Citibank

The ways to prevent phishing scam:

  1. Check where the email comes from
    • Checking the sender of the email. If the email address is not the domain of a legitimate bank/service, then it is certainly a phishing scam

  2. Do not follow a “click here” link in the email
    • The email will contain the link which named as “Click here” or link which may re-enter to your user information. Please measure whether the link is meeting to the legitimate website or content before you click on it.

  3. Check contact information provided in the email
    • Double check the contact information by using your recorded contact information such as phone number, fax number and address of that company to the email.

  4. Check your personal information that provided in the email
    • You can check out the information that stated in the email by figuring out whether it suits your original information such as when you register for this website or account.

  5. Make sure a site's URL as listed in the browser is legitimate
    • Verify the legitimacy of a web address with the company directly.

  6. Avoid filling out forms in e-mail messages

~For more information, please refer to following websites:


  • http://www.privacyrights.org/ar/phishing.htm
  • http://antivirus.about.com/od/emailscams/ss/phishing_8.htm
  • http://chris.pirillo.com/top-five-ways-to-prevent-phishing
  • http://en.wikipedia.org/wiki/Phishing
  • Labels: edit post
    0 Responses

    Post a Comment