answersLogoWhite

0

Because the sole purpose of phishing (pronounced fishing) - is to attempt to collect personal data from a person that can then be use (for example) to steal money from their bank accounts.

Sites that attempt phishing often mimic legitimate sites. For example - recently, a glut of foreign websites targeted the UK with emails that appeared to come from legitimate UK banks. These emails claimed the person's account might have been hacked - and asked the person to confirm their bank details by keying in their account information.

What the people who launched those sites failed to realise was - most people are not THAT stupid ! I, myself had phishing emails from sites claiming to be HSBC and Yorkshire banks - asking me to enter my account details for 'verification'.. BOTH of which I have NEVER banked with ! I simply printed the emails, and presented them at the relevant banks in person - so that their fraud department could use the information to trace those responsible.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

Why is worm a threat to data held on a computer system?

because it is


What are consequences of phishing?

The risks of phishing include getting a virus on your computer or phone. You can also be fined very heavily if caught phishing.


Can phishing scams give your computer viruses?

It can give your computer spam


What is the greatest threat to the data stored on a personal computer?

Viruses, probably (if you're talking about software)


A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.


Which computer tool is used for phishing?

You do not need software to make a phishing website. You simply need a web server and an identical copy of the website in question (with a few changes so the data in the fields go to you). I can't describe it as it is illegal in most countries.


What are cyber threats?

Cyber threats are anything adversely affecting computer security. This includes malware, phishing, hacking, or anything else that destroys data, compromises computers or steals information.


What can pharming do to your computer?

Please explain Pharming It's related to Phishing, but involves the actual redirection to bogus websites. The results to your computer may include compromised data (including passwords, credit card and bank details, etc) and even death of the computer through viral infection.


How can unauthorised access to stored data be a threat to you personally?

If a hacker has access to information like your Social Security or bank account information etc from your personal computer - what would happen? The same kind of threat can happen if someone gains unauthorized access to data from a database.


Where are phishing attacks most common?

Phishing attacks can happen through almost any computer. It can commonly be found through email scams, asking for money or account information. They may also add a virus to the computer.


What are some computer hacking examples?

Using a Phishing site to get someones email And Pass


How do threat actors deploy phishing attacks?

Attackers take advantage of several means to be successful in such attacks. Let us discuss a few of them. Domain Squatting: Practice of buying a domain name to prevent someone else, usually an organisation who is in legitimate need from using it. For instance, if an organisation is planning to launch its new product and intends to use its name in the website page; a threat actor could have registered this under their name and the organisation who is desperately in need and requires that domain name will have to pay a hefty amount to the threat actor to acquire the rights to that domain name Website Spoofing: Creating a carbon copy of a legitimate website and befooling users to click and enter information that the threat actors need Phishing Kits: Threat actors sell phishing kits across darknet markets. These are templates to build a phishing site so even a novice threat actor can weaponize it.