final phishing
DESCRIPTION
presentacionTRANSCRIPT
-
CONTENTS :-IntroductionTypes of phishingExamples of phishingTechniques of phishingPrevention methods
-
FISHING
-
PHISHING
-
Phishing is an attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
Phishing is typically carried out byemail spoofing orinstant messaging,and it often directs users to enter details at a fake website whoselook and feelare almost identical to the legitimate one.
-
Types of phishingSpear phishing
Clone phishing
Whaling phishing
-
Characteristics of phishing emails
-
1. Disguised hyperlinks and sender address-
Appear similar as the genuine institution site. Sender address of the email also appears as originated from the targeted company.
-
2. Email consists of a clickable image :
Scam emails arrive as a clickable image file containing fraud request for information.
-
3. Content appears genuineScam email include logos, styling, contact and copyright information. identical to those used by the targeted institution.
-
4. Unsolicited requests for sensitive information :
Emails asks to click a link and provide sensitive personal information .
It is highly unlikely that a legitimate institution would request sensitive information in such a way.
-
5. Generic GreetingsScam mails are sent in bulk to many recipients and use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer".
-
Phishing Techniques
-
Example of Phishing Email
-
By manipulating the links for example
www.facb00k.comInstead of www.facebook.com
Misspelled URLs or sub domains are common tricks used by Attacker
-
Key loggers are designed to monitor all the key strokes
-
Never respond to emails that request personal financial information
Visit banks websites by typing the URL into the address bar
Keep a regular check on your accounts
Be cautious with emails and personal data
-
Keep your computer secure
Use anti-spam software
Use anti-spyware software
Use the Microsoft Baseline Security Analyser (MBSA)
Use Firewall
-
It is better to be safer now than feel sorry later.
Thank you.
***