answersLogoWhite

0

Because the sole purpose of phishing (pronounced fishing) - is to attempt to collect personal data from a person that can then be use (for example) to steal money from their bank accounts.

Sites that attempt phishing often mimic legitimate sites. For example - recently, a glut of foreign websites targeted the UK with emails that appeared to come from legitimate UK banks. These emails claimed the person's account might have been hacked - and asked the person to confirm their bank details by keying in their account information.

What the people who launched those sites failed to realise was - most people are not THAT stupid ! I, myself had phishing emails from sites claiming to be HSBC and Yorkshire banks - asking me to enter my account details for 'verification'.. BOTH of which I have NEVER banked with ! I simply printed the emails, and presented them at the relevant banks in person - so that their fraud department could use the information to trace those responsible.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

How does phishing affects your computer?

Phishing affects your computer primarily by tricking you into revealing sensitive information, such as passwords or financial details, often through deceptive emails or websites. If you fall victim to a phishing attack, it can lead to malware installation, data breaches, or unauthorized access to your accounts. This not only compromises your personal data but can also result in financial loss and damage to your computer's security. Additionally, phishing can spread malware that affects other devices on your network.


Why is worm a threat to data held on a computer system?

because it is


What are consequences of phishing?

The risks of phishing include getting a virus on your computer or phone. You can also be fined very heavily if caught phishing.


Can phishing scams give your computer viruses?

It can give your computer spam


What is the greatest threat to the data stored on a personal computer?

Viruses, probably (if you're talking about software)


A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.


Which computer tool is used for phishing?

You do not need software to make a phishing website. You simply need a web server and an identical copy of the website in question (with a few changes so the data in the fields go to you). I can't describe it as it is illegal in most countries.


What are cyber threats?

Cyber threats are anything adversely affecting computer security. This includes malware, phishing, hacking, or anything else that destroys data, compromises computers or steals information.


Could be and accidental threat to data?

An accidental threat to data can occur through unintentional actions, such as an employee mistakenly deleting important files or misconfiguring security settings. Human error, like sending sensitive information to the wrong recipient or falling for phishing scams, can also compromise data integrity and confidentiality. Additionally, hardware malfunctions or software bugs may lead to unexpected data loss or corruption. These incidents highlight the importance of robust data management practices and regular training for employees.


What can pharming do to your computer?

Please explain Pharming It's related to Phishing, but involves the actual redirection to bogus websites. The results to your computer may include compromised data (including passwords, credit card and bank details, etc) and even death of the computer through viral infection.


How can unauthorised access to stored data be a threat to you personally?

If a hacker has access to information like your Social Security or bank account information etc from your personal computer - what would happen? The same kind of threat can happen if someone gains unauthorized access to data from a database.


Where are phishing attacks most common?

Phishing attacks can happen through almost any computer. It can commonly be found through email scams, asking for money or account information. They may also add a virus to the computer.