answersLogoWhite

0

🚓

Phishing

Phishing is the term given to popular internet and email scams which rely on a malevolent user (a “phisher”) tricking an unsuspecting person into revealing sensitive information (financial information, social security numbers, etc.). Questions about phishing techniques and how to avoid being taken advantage of belong here.

500 Questions

True or false best practices to prevent becoming a victim of phishing is to never provide your Pii to any unauthorized person?

User Avatar

Asked by Wiki User

While not giving your PII - including usernames, passwords, account numbers, etc. to unauthorized persons is a good way to avoid becoming a victim f phishing, the whole point of phishing is to impersonate an authorized person or entity, thus a person can still be a victim of phishing while believing they have never provided their PII to an unauthorized person. To be effective in defending yourself from phishing, you have to combine the policy of not divulging PII to unauthorized persons with an effective procedure for verifying the identity of the person or entity requesting the PII and being suspicious of requests for PII until you have confirmed both the identity of the person or entity requesting it AND their legitimate need for it.

Where are phishing attacks most common?

User Avatar

Asked by Wiki User

Phishing attacks can happen through almost any computer. It can commonly be found through email scams, asking for money or account information. They may also add a virus to the computer.

How much trouble do you get in if you get caught phishing?

User Avatar

Asked by Wiki User

You can get into a lot of trouble for phishing, including jail or prison time.

All states have laws that prohibit acquiring someone's personal information, but not all have laws that specifically address phishing. In fact, only a minority of states have laws that deal specifically with phishing; however, even states that do not have laws specific to phishing, have other laws that can apply to phishing activity, making phishing a crime in every state in the United States.

There is no single Federal law that directly criminalizes phishing, but there are broader federal criminal laws that apply to phishing. Those broader laws can be used to punish those who engage in phishing activity.

Though state laws differ significantly, most categorize phishing as a felony. Even if classified as a misdemeanor, which are considered less serious crimes than felonies, conviction can result in significant criminal penalties. Those penalties can include:

  • Jail or prison - Whether considered a misdemeanor or felony, a conviction can result in a year of incarceration. Felonies can result in up to five years.
  • Fines - Misdemeanors usually do not exceed a couple thousand dollars. Felonies can be $10,000 or more per offense.
  • Restitution - If the victim lost money as a result of phishing activity, the perpetrator may be ordered to pay the victim for their loss. This is in addition to any fines that may be imposed.
  • Probation - A phishing conviction can result in a probation sentence, especially if the person has not previously been convicted of a crime. Probation usually is one to three years, but can be longer. Probationary terms may differ, but they usually include regularly reporting to a probation officer, maintaining employment, paying all required fines and restitution, and not committing any more crimes while you are on probation.

What a phishing attack?

User Avatar

Asked by Wiki User

A phishing attack is launched by a malefactor sending out emails designed to look like they are coming from a legitimate trusted source such as the victim's bank, the tax collector, the phone company, law enforcement, PayPal, etc. The victim is asked to visit a site that looks like a legitimate web site for the trusted entity where they are usually asked to enter sensitive data such as account passwords, personal ID numbers, bank account numbers etc. that can then be misused by the evil-doer to steal money from or incur debt in the name of the victim. Sometimes the attack will be designed to implant malware on the victim's computer which can then be used to steal more information from the victim or take control of the victim's computer for further use in nefarious schemes.

What is the goal of whale phishing using personal info to create emails or websites targeting senior leaders or executives?

User Avatar

Asked by Wiki User

The goal of "whale phishing" using personal information to create emails or websites targeting senior leaders or executives is to gain access to systems and people within systems.

What is spoofing?

User Avatar

Asked by Wiki User

In spoofing, the attacker tries to obfuscate the actual origins of a message. In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. This is often accomplished by changing the header on the message to inject a false origin address or to try to make an application display a false origin address. Sometimes an attacker may send a message with a series of false routing hops prior to their own address and then just pull in the message as it comes to them (and not forward it).

Phishing attacks may employ a variation on spoofing to deceive a user into believing that a message came from a legitimate source or that the site they are about to visit is actually the legitimate site for a legitimate business. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is sometimes referred to as "webpage spoofing". The miscreant/criminal attacker reproduces the appearance and feel of a legitimate site in order to trick the victim into entering sensitive data. The web address for the phishing site may closely resemble the legitimate site or it may include the address of the legitimate site but include code in the address to reroute the traffic to the false website.

To summarize - spoofing seeks to obscure the source of a message while phishing seeks to obscure the destination that the user is going to, so a "phishing and spoofing attack" would combine these two.

Who started phishing?

User Avatar

Asked by Wiki User

It is unclear who first created phishing, as social engineering attacks have been around for many years. A phishing technique was first described in a paper and presentation delivered to the 1987 International HP Users Group, Interex. The exact term phishing was first used in a hacking tool known as AOHell, released in 1994 by "hackers" known as Da Chronic, The Rizzer, and The Squirrel.

On the funny side:

"Actually I created the term phishing, then my wife came out and hollered at me to go out and find a job. But the problem is they were biting really good." -- Anonymous Answers contributor.

Who is winner of coca cola mobile draw?

User Avatar

Asked by Wiki User

It depends on your country and the date of the draw.

There are 365 days in a year and 208 countries (206 of them which sell coca-cola).

Why is phishing bad?

User Avatar

Asked by Wiki User

Phishing is bad. Phishing schemes are ways for unscrupulous people to gain access to personal information about people. They can then use this information for unethical reasons.

What can people do to protect themselves against phishing?

User Avatar

Asked by Wiki User

Never do anything contained IN an email or click on any link in an email. If you are concerned look for the website to use on paperwork you have, or independently go to the official website using a web address that you know works, outside of that contained in the email.

Never provide IDs, Accounts, PINS, Passwords to anybody emailing you, phoning you or coming to see you.

If you get an email or phone call that you were not expecting saying you have won something or offering you some get rich quick opportunity - do not answer it - if it too good to believe - it is a scam.

Never answer unwanted phone calls or emails, and with emails mark them as SPAM then delete them without opening them.

What are two ways you protect yourself against ultraviolet light?

User Avatar

Asked by Wiki User

When you are going to be out in the sun for a long period, wear sunblock, and spend some time in the shade when you can.

To choose a sunblock, the SPF rating tells you the multiple for how long you should be able to be in the sun. e.g. SPF 10 multiplies how long you can be in the sun without burning by 10.

This is not an easy number to know any true value for. Every person burns at a different rate, every time you step into the shade for a couple minutes it helps prolong this time, and how direct the sun is, as well as many other factors can lengthen or shorten how long it will take to burn.

How do you fight a phishing scam?

User Avatar

Asked by Wiki User

It usually doesn't do any good to report it to the bank/broker/retailer/service that is being spoofed. They do not have any staff to pursue phishing attempts. It would be great if they would set up "honeypots" to trap the criminals, but they don't.

About the only thing you can do to fight phishing is to make it unprofitable by wasting the scammers' time. Go to their bogus web site and feed them entirely phony information: name, e-mail address, password, whatever. The more people who do this, the less profitable phishing becomes.

What's a good example of phishing emails?

User Avatar

Asked by Wiki User

You might receive an email that looks like it was sent by PayPal. The email might say that you need to click on a link to verify your PayPal account. If you don’t? The email says that your PayPal account will be shut down.

Here’s an example of a PayPal phishing email.

there is reliable protection against phishing at this link h ttps: //manwomancontact.blog spo**t .**com/ (you need to copy and paste this link in the search bar and do not forget to remove the space between the letter h and p , g and s , t and . to make the link active) take this coupon code N360LIFELOCK50

What impact does phishing have?

User Avatar

Asked by Wiki User

Phishing affect your privacy online from denial of access to email to substantial financial loss. This style of identify theft is becoming more popular, because of the readiness with which unsuspecting people often divulge personal information to phishers, including credit card number, social security numbers, and mothers' maiden names. The theft stole your privacy thing from your internet. There are also fears that identity thieves can add such information to the knowledge they gain simply by accessing public records. Once this information is acquired, the phishers may use a person's details to create fake accounts in a victim's name. They can then ruin the victims' credit, or even deny the victims access to their own accounts.

How do you stop your fear of looking into someone's eyes?

User Avatar

Asked by Wiki User

Answer

Well, I used to have trouble looking into people's eyes too, but I'm still improving it by forcing myself to do it. You can try to look yourself in the eyes in the mirror and try other people later. Hope this helps!

Just think of it as an etiquette lesson, as it is rude not to give someone your eyes when speaking or being spoken to. If you wear glasses, take them off so you can't see the other person very well . This is how I conquered my first public-speaking class .

How do you pronounce the word phishing?

User Avatar

Asked by Wiki User

The term "phishing" is pronounced the same as the word "fishing". The 'ph' has an '"f" sound like phone, pharmacy, or phonetic. The "PH" stands for "Personal History" as the scammer is usually posing as a legitimate interest who needs your information.

What are the recommended password guidelines?

User Avatar

Asked by Wubbzilla

An expiration period should be used for passwords that expire.

Uz1 Sn1p3R

Training and instinct are two ways to protect yourself from Phishing scams?

User Avatar

Asked by Wiki User

The two ways to protect yourself from Phishing scams a training and instinct are

1. Never trust strangers: The same rules you were taught as a child come into play here; DO NOT open emails that are from people you don't know. Set your junk and spam mail filter to deliver only content from those in your address book.

2. Sidestep those links: What happens if your spam filter is fooled into delivering junk mail to your inbox, and you happen to open it? Simple - NEVER click on links embedded in your email.

3. Guard your privacy: Your mouse just happened to move over the link and lo and behold, you're transported to another website where you're asked to provide sensitive information like user names, account numbers, password and credit card and social security numbers. Just one word for you - DON'T.

4. Fear Not: More often than not, these phony websites come with threats or warnings that your account is in danger of being deactivated if you don't confirm your user information, or that the IRS is due to pay you a visit if you don't comply with what's written on the page. Just IGNORE them.

5. Pick up the phone and call: If you are in doubt that it just may be a legitimate request, and that your bank is actually asking you to reveal sensitive information online, CALL your customer service representative before you do anything foolhardy.

6. Use the keypad, not the mouse: TYPE in URLs instead of clicking on links to online shopping and banking sites that typically ask for credit card and account numbers.

7. Look for the lock: Valid sites that use encryption to securely transfer sensitive information are characterized by a lock on the bottom right of your browser window, NOT your web page. They also have addresses that begin with https:// rather than the usual http://.

8. Spot the difference: Sometimes, just the presence of the lock alone is proof enough that the site is authentic. To verify its genuineness, double-click the lock to display the site's security certificate, and CHECK if the name on the certificate and the address bar match. If they don't you're on a problem site, so get the hell out of there.

9. Second time right: If you're worried that you've reached a phishing site that's masquerading as your banking page, sometimes the easiest way to check is to enter a WRONG password. The fake site will accept it, and then you're usually redirected to a page that says they're having technical difficulties, so could you please check back later? Your original banking site will not allow you entry.

10. Different is the keyword here: Use DIFFERENT passwords for different sites; I know it's a tough ask these days when most functions of the brain are being passed on to technology, but this is a good way to prevent phishers from getting at all your sensitive transactions, even if they've managed to compromise one.

11. Keep your eyes open: A spam email is littered with grammatical errors, is generally not personalized, and usually has either some link or a suspicious attachment. RECOGNIZE and report them as spam.

12. Familiarity breeds contempt: Not sure that you can spot a phisher's email when you receive one? Well, take a LOOK at these and you'll know how they're generally framed. By and by, you'll learn how to spot the fake ones.

13. Greed doesn't pay: NEVER be taken in by offers of money for participating in surveys that ask for sensitive information. These are always fraudulent attempts to get hold of your personal details. You may get the $20 that's promised, but there's also a high probability that you may find your account cleaned out.

14. No stepping out: Do not leave your computer UNATTENDED when logged into your bank account or when you've provided credit card information on a shopping site.

15. Proper exits count: Once you've finished your business, LOG OUT properly instead of just closing the browser window, especially if you're using a public terminal.

16. You can never be too careful: LOG INTO your bank account on a regular basis and keep tabs on your money. You don't want to wake up one fine day and find that a phisher's been siphoning off a few hundred dollars every now and then.

17. A little knowledge is not dangerous: Keep yourself up to date with the latest news and INFORMATION on phishing.

18. Hard evidence: Be very careful when disposing of old computers and hard disks. Recycled computers have been found to retain confidential information pertaining to Internet banking. Use software to ERASE and over-write data on your hard disk to ensure that it is not recoverable.

For business as usual…

19. I know him, or do I? Beware of SPEAR PHISHING - when your corporate account is compromised and emails soliciting private information reportedly come from your colleagues or higher-ups, it's better to call the person concerned and verify the authenticity of the email.

20. Peruse those records: As part of a business organization, there's much you can do to prevent phishers from compromising your firm's security. Set up firewalls and get you're your anti-virus systems in place. MONITOR the logs from your DNS and proxy servers, firewalls and other intrusion detection systems on a regular basis to check if you've been infected.

21. Policy is the best policy: Set strict POLICIES for the creation of passwords for your clients, servers and routers, and ensure that your personnel follow them diligently.

22. No intruding: Establish intrusion detection and prevention systems that protect your network content and prevent the sending and receipt of phishing emails. Protect your GATEWAY with anti-phishing and anti-virus tools and firewalls.

23. Watch the company you keep: Maintain a list of approved DEVICES that are allowed to connect to your firm's network.

Taking technology on your side…

24. It's a matter of trust: An important question is, can you trust the site's certificate to be authentic? VeriSign was guilty of issuing security certificates to sites that claimed to be part of Microsoft not so long ago. The latest versions of browsers, IE 7 and Opera 9 will soon be able to provide users with EV SSL (Extended Validation SSL) certificates that assure them of being on a genuine site. The address bar shows green for the good guys and red for the doubtful ones.

25. From phishers with greed: Emails can also be spoofed. The only way you can be sure they are not, is to use clients that support S/MIME digital signatures. First check if the sender's address is correct, and then look for the digital signature. This is a pretty effective anti-phishing tactic as the signature is generated by the client after the mail has been opened and authenticated, and because it's based on robust cryptographic techniques.

26. Keep up or else: Make sure your operating system and browsers are UPDATED regularly. Check for the latest patches and apply them immediately.

27. Build that fence: PROTECT your computer with effective anti-virus and anti-spam software, and set up firewalls to keep those sneaky Trojan horses out. They are capable of the worst kind of phishing - installing surreptitious key-logging software on your system that captures all your keystrokes and transports them to the crooks in some unknown location. What's worse is that the infection spreads from your PC to other systems on your network, till all the computers are compromised.

28. Two are better than one: Use two-factor authentication to log on to sensitive sites. The COMBINATION of a software token like a password and a hardware device like an ATM card make it doubly hard to crack open an account with just one or none of the two verification factors.

29. Step by step: It's harder for phishers to gain access to your password if you SPLIT the login process into two phases - entering your user ID in the first and other credentials in the second. The process is even more secure when you enter identification details in the second phase only if the input window is personalized in some way, for example, if an image explicitly selected by you is displayed.

30. Not just a token: Consider using an ID Vault USB TOKEN that encrypts all your user ids and passwords and stores them on a flash drive, which can then be used to securely log onto websites. Most tokens come with a list of legitimate sites and also prevent key-logging software from working effectively. The device itself is password-protected, so thieves have an added layer of encryption to tackle.

31. Hashing to confuse: Software plug-ins are joining in the fight against phishing, an example being the PwdHash, or password HASH tool developed by two Stanford professors that scrambles any password you type, and creates a unique sign-on for each site you visit. Even if phishers are given a password, it's the wrong one.

32. I spy no spies: Another application developed along the lines of PwdHash, and also created by the same two Stanford professors, the SPYBLOCK tool prevents Trojan horse key-logging programs from stealing your passwords.

33. Extending protection: Browser extensions like Antiphish used as a plug-in by Mozilla's Firefox offer protection against phishing attacks by maintaining LISTS of passwords and other sensitive information, and issuing warnings when users type this information on fishy sites.

34. Framing policies: Banks and online business houses would do well to use the open-source SPF (Sender Policy Framework) standard which prevents email addresses from being spoofed by listing servers that are allowed to send mail.

35. Taking on trust: As an alternative, they could use a TRUST SERVICE like GeoTrust's True Site that allows customers to verify a website's authenticity.

Prospective protection against phishing…

36. Sending positive signals: New technologies like the Sender ID Framework (SIDF) are joining in the fight against spoofing websites by verifying the source of each email. In the pipeline from Microsoft and CipherTrust.

37. Not barring trust: TrustBars, which are secure and tamper-proof components of browsers, allow VISUALIZATION of information related to sites. Users are alerted by visible warnings when there is a discrepancy in the visualization on the bar.

38. Slow down those attacks: Another technique, the Delayed Password Disclosure (DPD), protests against pop-up windows that ask for sensitive details (aptly termed doppelganger window attacks) works against phishing attacks when users enter passwords letter by letter, one following the other only after a corresponding image is recognized.

39. Proof positive: Websites that wish to prove they are authentic can use HTML extensions called PROOFLETS to enhance a server's contents. These are verified by browsers through the use of special web services.

Alternative approaches…

40. Mobility in scams: As consumers are wising up to their scams, phishers are moving on to newer media to launch their scams. Mobile phones, a necessity in today's world, are the latest targets. Text messages purporting to originate from your bank warn you that unless you confirm your account information, it will be deactivated. IGNORE these messages, they are always spam.

41. Voicing doubts: Another hot sphere of activity, the VoIP technology, is being harnessed as a phishing tool with alarming regularity. The crooks find it COST-EFFECTIVE to make numerous calls and earn a sum well above the incurred expenses. This is doubly dangerous because people, who would look at an email in with suspicion, generally tend to believe phone calls.

Make a difference…

42. Join the fight: If you come across a phishing scam, REPORT it at once to the Anti-Phishing Working Group, the U.S. Federal Trade Commission (FTC) and the FBI through the Internet Fraud Complaint Center, both of whom work to shut down phishing sites and catch those responsible.

43. Say goodbye: If any of your accounts have been compromised, CLOSE them at once.

44. Change is good: If you even suspect that your any one of your passwords has gone to the wrong hands, CHANGE all your passwords and pin numbers on online accounts immediately.

What are the common tools used to protect against phishing?

User Avatar

Asked by Wiki User

Phising scams are when someone tries to gain personal information about you, be it your passwords, bank details or other you need protection. Tools that can help with this are antivirus software, do not open any emails from addresses you do not recognize or hyperlinks in emails, check https appears in your web browser and secure lock button is there when entering secure information.