SlideShare une entreprise Scribd logo
1  sur  10
2
3




     Phishing is the act of fooling a computer user into submitting
        personal information by creating a counterfeit website that
        looks like a real (and trusted) site. It is a hacker technique of
        "fishing" for passwords and other secret financial info.

        Phishing (pronounced "fishing") is a type of online identity
        theft. It uses email and fraudulent websites that are designed
        to steal your personal data or information such as credit card
        numbers, passwords, account data, or other information.
4




    1.   Hacker embeds fake login
         form to the XSS vulnerable
         page. It might be on-line
         shop, internet
         banking, payment
         system, etc.

    2.   Hacker sends Email with the
         link to this transformed
         page (actually link contains     3.   User clicks the link and opens fake
         HTML injection code as a              web-page. If user enters his
         parameter). This email looks          username and password to login, all
         pretty similar to emails              of their account details will be sent to
         typically sent from this web-         hacker’s web-server.
         site to registered users (only        User may not notice anything strange
         without user name in                  because real “Home” or “Welcome”
         greeting)                             pages are what he was expecting to
                                               see.
5
6




       Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.
       Beware of links in email. If you see a link in a suspicious email message, don't click on it.
       Threats. Have you ever received a threat that your Hotmail account would be closed if you
        didn't respond to an email message? The email message shown above is an example of
        the same trick.
       Spoofing popular websites or companies. Scam artists use graphics in email that appear
        to be connected to legitimate websites but actually take you to phony scam sites or
        legitimate-looking pop-up windows.
7




       1. Use The Right Domain Name. Every time you log into your social
        media profile, make sure you’re on the correct domain name of the
        website. Some sites may have short-cut URL’s, but a good way to tell
        if a site is legitimate is if it ends in the site’s name (e.g. en-
        gb.facebook.com is the legitimate address for Facebook users in the
        UK).

       2. Change Passwords Frequently. Changing your login password
        every few months (or more often if you want to be safer) will throw
        off almost any hacker on your trail. Passwords should be as long and
        complex as possible using both numbers and letters non-
        consecutively. Avoid reusing old passwords and predictable patterns
        when changing them, like adding the current month at the end.
8




       3. Avoid Deceptive and Unfamiliar Links. Clicking deceptive and
        unfamiliar links or copying and pasting unfamiliar URL’s on your
        browser can automatically give hackers control over your
        account. If you don’t know what it is, even if it comes from a
        familiar or legitimate contact, don’t access it.

       4. Choose Apps Wisely. Third-party apps for news, games, and
        other categories first request permission to access your account,
        but may do more when you’re not around. Remove apps you
        don’t use regularly to reduce the chances of it happening.

       5. Update Your Browser. Popular online browsers, like Google
        Chrome or Internet Explorer, have built in security measures that
        enable phishing and malware protection.
9




       Phishing is identity theft. It is fraud. It
        masquerades as legitimate and
        trustworthy entities in order to obtain
        sensitive data. It then uses it to “rip
        off” the misled user with often tragic
        consequences.
       A good protection involves being
        vigilant and having decent Internet
        security software installed – like
        Norton 360. Norton 360 comes with
        many protective
        features, including identity theft
        protection. In addition to this, services
        like LifeLock add an additional security
        layer when about identity theft alone.
10




     1.   http://www.surfnetkids.com/what_is_phishing.htm

     2.   http://www.microsoft.com/en-
          gb/security/resources/phishing-whatis.aspx

     3.   http://www.sec.state.ma.us/sct/sctphish/avoid_phish
          ing_scams.pdf

     4.   http://www.betterantivirus.com/nod32-and-virus-
          news/archives/1690-Detecting-a-Phishing-or-Spear-
          Phishing-Email.html

     5.   http://internetsecurityhome.com/what-is-phishing/

Contenu connexe

Plus de Kak Yong

Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Kak Yong
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Kak Yong
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Kak Yong
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Kak Yong
 
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02Kak Yong
 

Plus de Kak Yong (20)

Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
 
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
 

Dernier

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Phishing

  • 1.
  • 2. 2
  • 3. 3  Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of "fishing" for passwords and other secret financial info.  Phishing (pronounced "fishing") is a type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.
  • 4. 4 1. Hacker embeds fake login form to the XSS vulnerable page. It might be on-line shop, internet banking, payment system, etc. 2. Hacker sends Email with the link to this transformed page (actually link contains 3. User clicks the link and opens fake HTML injection code as a web-page. If user enters his parameter). This email looks username and password to login, all pretty similar to emails of their account details will be sent to typically sent from this web- hacker’s web-server. site to registered users (only User may not notice anything strange without user name in because real “Home” or “Welcome” greeting) pages are what he was expecting to see.
  • 5. 5
  • 6. 6  Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.  Beware of links in email. If you see a link in a suspicious email message, don't click on it.  Threats. Have you ever received a threat that your Hotmail account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick.  Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
  • 7. 7  1. Use The Right Domain Name. Every time you log into your social media profile, make sure you’re on the correct domain name of the website. Some sites may have short-cut URL’s, but a good way to tell if a site is legitimate is if it ends in the site’s name (e.g. en- gb.facebook.com is the legitimate address for Facebook users in the UK).  2. Change Passwords Frequently. Changing your login password every few months (or more often if you want to be safer) will throw off almost any hacker on your trail. Passwords should be as long and complex as possible using both numbers and letters non- consecutively. Avoid reusing old passwords and predictable patterns when changing them, like adding the current month at the end.
  • 8. 8  3. Avoid Deceptive and Unfamiliar Links. Clicking deceptive and unfamiliar links or copying and pasting unfamiliar URL’s on your browser can automatically give hackers control over your account. If you don’t know what it is, even if it comes from a familiar or legitimate contact, don’t access it.  4. Choose Apps Wisely. Third-party apps for news, games, and other categories first request permission to access your account, but may do more when you’re not around. Remove apps you don’t use regularly to reduce the chances of it happening.  5. Update Your Browser. Popular online browsers, like Google Chrome or Internet Explorer, have built in security measures that enable phishing and malware protection.
  • 9. 9  Phishing is identity theft. It is fraud. It masquerades as legitimate and trustworthy entities in order to obtain sensitive data. It then uses it to “rip off” the misled user with often tragic consequences.  A good protection involves being vigilant and having decent Internet security software installed – like Norton 360. Norton 360 comes with many protective features, including identity theft protection. In addition to this, services like LifeLock add an additional security layer when about identity theft alone.
  • 10. 10 1. http://www.surfnetkids.com/what_is_phishing.htm 2. http://www.microsoft.com/en- gb/security/resources/phishing-whatis.aspx 3. http://www.sec.state.ma.us/sct/sctphish/avoid_phish ing_scams.pdf 4. http://www.betterantivirus.com/nod32-and-virus- news/archives/1690-Detecting-a-Phishing-or-Spear- Phishing-Email.html 5. http://internetsecurityhome.com/what-is-phishing/