.blog

Thursday, February 5, 2009

Phishing - Examples and Its Prevention Methods

A growing Internet scam that has caused many people in divulging their valuable confidential information has been given the name called “ Phishing ”. Generally, this type of scam simulates to be from a legitimate source such as financial institution, sending out phony emails to trick people into showing up confidential or personal information, e.g. credit card numbers, account usernames and passwords.

Phishing has typically been carried out not only in the form of email or instant messaging by directing users to a particular website, but also messages that claimed to be from a bank requiring users to dial a phone number regarding a problem with their bank account.

How does it work?

Normally, you will be asked to verify your account by an email specifying that verification is needed to be done. Once you clicking on the link in the email, you are asked to update or confirm your personal information. Information regarding to users is revealing to other party under this circumstances.

How does it look like?

Example of a Phishing e-mail message, including a deceptive URL address linking to a scam Web site.





Prevention Methods

1. Bypass the link of suspected phishing message
Users are encouraged to contact the company in order to check out legitimacy of the email if verification is needed once. Moreover, users may type in a trusted web address for the company’s website into the address bar of their browser so that linkage to unnecessary website could be avoided.

2. Advert to generic greeting
Most of the companies will address their valued customers by their username in emails or financial institutions (banks or credit card companies) will often include partial account numbers while delivering emails. Therefore, users should be aware if an email is addressing in a generic manner, it is likely to be an attempt at phishing.

3. Report to the relevant authorities

Users might report to MyCert or CyberSecurity at the right time to prevent the phishing message from spreading continuously.

~ References ~

posted by mei_huei at

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home