answersLogoWhite

0


Best Answer

A phisher makes an exact duplicate of the site in which the victim has account.

When the victim logs in, thinking he's logging in the original website, the login details get to the phisher. The phisher obtains that information and logs in the original website and takes over the victim's account.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does a phisher acquire persnol information from Internet users?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is function of an email link?

To get you to click it. If from a friend, this is a convenient way to share a website. If from a phisher or spammer, it is to steal information or infect your computer.


Who is the phisher pretending to be?

a melitous perso


What is a Phisher's Tool?

social engineering


What is the Gmail phisher?

The gmail phisher is an attempt to gain private information by masquerading as a request from gmail asking you for your account information. Though the request will appear to be from gmail it is in fact not and any information gained from you can potentially be used in identity theft. No matter how much you trust an email source never click on a link in an email asking for account information. If you think the request is legitimate go directly to the site itself, log in and see if they are, in fact, requesting and updated information from you.


How does phisher tipically contact the victim?

by email


How do you restore account after it has been phished?

If the phisher changed your account information (password, etc.) you it will be very hard to get it back.Start by attempting to log on to your account. If it works, change your password immediately so the phisher can't log in again. This will put you back in control of the account. If the phisher has changed your password, click the I can't access my account or similar link on the login page and attempt to recover your account.Take a thorough look at what personal information you have available within your account. You may have private data, such as credit card numbers or other sensitive materials. If you do, you should contact your credit card companies and let them know that someone may have access to your personal card number. They will help you from there.


How can I hack into another airg chat user airmail account?

Download AIM Phisher.


What is the difference between phishers and phishing?

phishing is the act of stealing accounts, and the phisher is the person that is phishing.


What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

phisher


What is known as pishing a cyber crime?

The word you're looking for is "phishing." Phishing is the attempt to get someone to reveal their login name,. password, or other credentials to access an online resource, such as a bank's web site. Typically, the phisher sends out e-mails that are "spoofed" to look like they came from the victim's bank or other merchant. The victim is asked to click on a link that appears to take them to the bank's web site, but is actually a look-alike site operated by the phisher. When the victim enters their user name and password, it is captured by the phisher, who then uses that information to log into the bank's real web site and exploit the victim's account. Phishing is a crime of fraud and is a felony in most jurisdictions, even if the actual loss amount is trivial.


How do you remove Trojan horse phisher-bzub?

If you get bzub you might as well throw out your hard drive, memory, CD drive, processor, and motherboard


How do you find out some Facebook user's ip if im his friend?

you can use a phisher or a keylogger but im not goin to tell you how... look it up haha