answersLogoWhite

0


Best Answer

Because the sole purpose of phishing (pronounced fishing) - is to attempt to collect personal data from a person that can then be use (for example) to steal money from their bank accounts.

Sites that attempt phishing often mimic legitimate sites. For example - recently, a glut of foreign websites targeted the UK with emails that appeared to come from legitimate UK banks. These emails claimed the person's account might have been hacked - and asked the person to confirm their bank details by keying in their account information.

What the people who launched those sites failed to realise was - most people are not THAT stupid ! I, myself had phishing emails from sites claiming to be HSBC and Yorkshire banks - asking me to enter my account details for 'verification'.. BOTH of which I have NEVER banked with ! I simply printed the emails, and presented them at the relevant banks in person - so that their fraud department could use the information to trace those responsible.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Phishing is simply creating duplicate login page and once it is used your login details gets hacked.

So through phishing your website login details get stolen and so it is crucial threat.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

the phishing is like a warning to a computer. it will tell to turn the computer or we turn it our self you have choose of them.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How is phishing a threat to data on a computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why is worm a threat to data held on a computer system?

because it is


What are consequences of phishing?

The risks of phishing include getting a virus on your computer or phone. You can also be fined very heavily if caught phishing.


A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.


Can phishing scams give your computer viruses?

It can give your computer spam


What is the greatest threat to the data stored on a personal computer?

Viruses, probably (if you're talking about software)


Which computer tool is used for phishing?

You do not need software to make a phishing website. You simply need a web server and an identical copy of the website in question (with a few changes so the data in the fields go to you). I can't describe it as it is illegal in most countries.


What are cyber threats?

Cyber threats are anything adversely affecting computer security. This includes malware, phishing, hacking, or anything else that destroys data, compromises computers or steals information.


What can pharming do to your computer?

Please explain Pharming It's related to Phishing, but involves the actual redirection to bogus websites. The results to your computer may include compromised data (including passwords, credit card and bank details, etc) and even death of the computer through viral infection.


How can unauthorised access to stored data be a threat to you personally?

If a hacker has access to information like your Social Security or bank account information etc from your personal computer - what would happen? The same kind of threat can happen if someone gains unauthorized access to data from a database.


Where are phishing attacks most common?

Phishing attacks can happen through almost any computer. It can commonly be found through email scams, asking for money or account information. They may also add a virus to the computer.


How do threat actors deploy phishing attacks?

Attackers take advantage of several means to be successful in such attacks. Let us discuss a few of them. Domain Squatting: Practice of buying a domain name to prevent someone else, usually an organisation who is in legitimate need from using it. For instance, if an organisation is planning to launch its new product and intends to use its name in the website page; a threat actor could have registered this under their name and the organisation who is desperately in need and requires that domain name will have to pay a hefty amount to the threat actor to acquire the rights to that domain name Website Spoofing: Creating a carbon copy of a legitimate website and befooling users to click and enter information that the threat actors need Phishing Kits: Threat actors sell phishing kits across darknet markets. These are templates to build a phishing site so even a novice threat actor can weaponize it.


What are some computer hacking examples?

Using a Phishing site to get someones email And Pass