123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Protecting Your Online Security-phishing

Profile Picture
By Author: Ivan Cuxeva
Total Articles: 782
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer Phishing involves attempts to fraudulently acquire personal information on a particular website usually made accessible through e-mails. These may include passwords, usernames, as well as credit card and bank account details.

There are three types of Phishing techniques used online. The first one is called 'Link manipulation'. Through this method phishers use a form of technical deception where a link in an e-mail appears to belong to a genuine website, but in truth the website is a fake representation of the link. These links are made deceivable as phishers use misspelled URLs or sub domains.

The second type of Phishing is called filter evasion. Filter evasion involves the use of images instead of text to redirect users to a website. This type of Phishing is harder to detect for anti-phishing filters because these filters are normally programmed to detect text commonly used in phishing e-mails.

Website forgery is the third type of online phishing. This process occurs when the user visits or is redirected to a website. Once there, the contents of the address bar are modified to a new URL which ...
... is a spoof link. This is done by either placing a picture over the URL or by replacing the original address bar with a new one containing a legitimate URL.

Once these phishers manage to obtain the user's personal information such as credit card details or social security numbers, they can create fake accounts under the user's name, thus ruining their credit or deny them access to their own accounts.

The most common way of combating phishing is by eliminating phishing e-mails. This is done by specialized spam filters where they rely on machine learning and natural learning processes to classify phishing e-mails.

Another way is to install anti-phishing features as extensions or toolbars for web browsers. These add-ins will then monitor websites and warn you when a spoof website is detected. The best way to combat phishing is if the user is able to recognize phishing websites and e-mails. If you receive an e-mail saying that an account needs to be verified, always try verifying the e-mail, because most are spoof e-mails. Phishing is becoming an extremely popular way of online fraud because of the modern browsing habits of users, surfing the web freely without caution. It is important that you keep track of your own online activities to combat this problem.

Total Views: 262Word Count: 398See All articles From Author

Add Comment

Computers Articles

1. How A Free Seo Checker Can Help You Understand And Improve Your Website
Author: Mahesh

2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill

3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong

4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos

5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape

6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia

7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong

8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders

9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape

10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong

11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal

12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong

13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams

14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders

15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: