IT Librarian

Menu
  • Home
  • Categories
    • World of Computers
    • Computer Hardware
    • Input/Output
    • Software System
    • Word Processing
    • Spreadsheets
    • Networks
    • Internet and the World Wide Web
    • Computer Security
  • About Us

IT Librarian

  • Home
  • Categories
    • World of Computers
    • Computer Hardware
    • Input/Output
    • Software System
    • Word Processing
    • Spreadsheets
    • Networks
    • Internet and the World Wide Web
    • Computer Security
  • About Us

Phishing

Details
Written by Fem Bartolome
Published: 30 November -0001

 

What is a phishing (pronounced similarly as "fishing") site?

 

According to Yahoo! Safety:

           A phishing website (sometimes called a "spoofed" site) tries to steal your account password or other confidential information by tricking you into believing you're on a legitimate website.

 

Sample scenario:

A (phishing) site poses as an online banking portal requiring the visitor (victim) to enter their online banking details. After pressing the Login button, the website displays a message saying that "Your request cannot be processed. Site is undergoing maintenance"

The victim waits for a few moments to try again only to receive the same message over and over. Finally, the victim decides to use an ATM only to find out that his/her account has been wiped clean and all of his/her hard-earned money is now gone.

That is how most phishing sites operate. They copy a legitimate site's layout and trick the users into keying in their personal accounts.

 

How do I avoid being a victim?

Number 1: Double-check the URL

o  Make sure that you know where you're supposed to be and make sure that you are actually where you're supposed to be

 

Number 2: pro-tip: Try to mistype your password on purpose to check if the site is actually verifying your details or would simply accept anything you’d key in to it.

TechCrunchIT

  • Pivotal Software closed up 5% following IPO, raised $555 million
    Stock market investors showed lukewarm enthusiasm for Pivotal Software’s debut on Friday....
  • Kubernetes and Cloud Foundry grow closer
    Containers are eating the software world — and Kubernetes is the king of containers. So if...
  • Stripe debuts Radar anti-fraud AI tools for big businesses, says it has halted $4B in fraud to date
    Cybersecurity continues to be a growing focus and problem in the digital world, and now Stripe is...
  • Cloud Foundry Foundation looks east as Alibaba joins as a gold member
    Cloud Foundry is among the most successful open source project in the enterprise right now....
  • Cloud.gov makes Cloud Foundry easier to adopt for government agencies
    At the Cloud Foundry Summit in Boston, the team behind the U.S. government’s cloud.gov...
  • You are here:  
  • Home
  • Categories
  • Computer Hardware
  • Articles
  • 09 Internet Safety
  • Phishing

Latest

  • Improving your Computer
  • Beware of the Internet
  • Word Processors vs Text Editors
  • Communication Inside the System Unit
  • The System Unit

Most Read

  • Beware of the Internet
  • Input Devices: A Closer Look
  • Are you safe?
  • Internet Myths
  • Internet FAQs

Categories

  • 01 Introduction

  • 02 Computer Hardware

  • 03 Input/Output

  • 04 Software System

  • 05 Word Processing

  • 06 Spreadsheets

  • 07 Networking

  • 08 Internet and the World Wide Web

  • 09 Internet Safety

  • 10 Computer Security

Copyright

Copyright © 2018 IT Librarian. All Rights Reserved.
Joomla! is Free Software released under the GNU General Public License.