ALL >> Computers >> View Article
Protecting Your Online Security-phishing
Computer Phishing involves attempts to fraudulently acquire personal information on a particular website usually made accessible through e-mails. These may include passwords, usernames, as well as credit card and bank account details.
There are three types of Phishing techniques used online. The first one is called 'Link manipulation'. Through this method phishers use a form of technical deception where a link in an e-mail appears to belong to a genuine website, but in truth the website is a fake representation of the link. These links are made deceivable as phishers use misspelled URLs or sub domains.
The second type of Phishing is called filter evasion. Filter evasion involves the use of images instead of text to redirect users to a website. This type of Phishing is harder to detect for anti-phishing filters because these filters are normally programmed to detect text commonly used in phishing e-mails.
Website forgery is the third type of online phishing. This process occurs when the user visits or is redirected to a website. Once there, the contents of the address bar are modified to a new URL which ...
... is a spoof link. This is done by either placing a picture over the URL or by replacing the original address bar with a new one containing a legitimate URL.
Once these phishers manage to obtain the user's personal information such as credit card details or social security numbers, they can create fake accounts under the user's name, thus ruining their credit or deny them access to their own accounts.
The most common way of combating phishing is by eliminating phishing e-mails. This is done by specialized spam filters where they rely on machine learning and natural learning processes to classify phishing e-mails.
Another way is to install anti-phishing features as extensions or toolbars for web browsers. These add-ins will then monitor websites and warn you when a spoof website is detected. The best way to combat phishing is if the user is able to recognize phishing websites and e-mails. If you receive an e-mail saying that an account needs to be verified, always try verifying the e-mail, because most are spoof e-mails. Phishing is becoming an extremely popular way of online fraud because of the modern browsing habits of users, surfing the web freely without caution. It is important that you keep track of your own online activities to combat this problem.
Add Comment
Computers Articles
1. Modern Software At Scale: A Practical Guide To Microservice DevelopmentAuthor: Tech Gazebos
2. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh
3. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft
4. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash
5. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs
6. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions
7. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel
8. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart
9. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos
10. Soluzioni Complete Per La Stampa In Ufficio: Assistenza, Noleggio E Manutenzione Professionale
Author: Mihai Filip
11. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona
12. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller
13. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp
14. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan
15. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru






