Skip to main content

What Is Phishing And How It Relates To Your Webmail Credentials ?

Recently, the webmail industry experienced what was believed to be a phishing incident where several thousands of credentials from Gmail, Yahoo and Hotmail accounts were exposed on a third-party site.

For those who are wondering exactly what phishing is, and how it relates to general spam: phishing  is a criminally fraudulent attempt to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy person or institution in e-mail or on a website. These credentials are used for identity theft, financial transactions and other potentially harmful activities. While “spam” refers to being targeted with unwanted emails in general (eg the common “Viagra ads”), phishing refers to attempts to obtain your webmail credentials and other identity with fraudulent intent. And unfortunately, it isn't anything new.
Some of the most common types of phishing attacks




1. Attacks that rely on forging identities:

In one of the most common types of attacks, the attackers change the name that is associated with an email address to a trusted, familiar name, like for example, “Windows Live Customer Support” or "Bank of America," even though their e-mail address still is "yourfriendlyspammer@live.com". If you're not paying attention, it can be easy to mistake a message like this for a genuine request from Windows Live or your bank.



2. Attacks that use stolen accounts:

In a variant of phishing, the attacker uses a previously compromised user account to send a link to everyone in the contact list for that account. If you unknowingly click the link, you land on a spam, phishing, or malware download site. As you can imagine, an e-mail you get from a friend’s account significantly increases the credibility of that message, and increases the likelihood of a successful attack. So, watch out for odd or uncharacteristic e-mails that comes from a friend’s account.



3. Attacks that ask you to provide credentials via phone:

In a typical phone phishing scam, the scammer may direct you to call a customer support phone number, claiming that your account will be closed or other problems will occur if you don't call the number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data.


4. Attacks via forged websites:

Many phishing attacks will convince you to trust them by including official-looking logos or other identifying information taken directly from legitimate websites. A common trick is to create a web address that resembles the name of a well-known company but is slightly altered by adding, omitting, or transposing letters. For example, the address "www.microsoft.com" could appear instead as: “www.micosoft.com” OR “www.mircosoft.com” OR “www.verify-microsoft.com”


5. Attacks using social engineering:

Sometimes a scammer will include convincing details about your personal life that they found on your social networking pages. It is easy for a user to think that they are getting an email from a friend wanting to reconnect and may inadvertently provide personal information.
Once the attackers have your credentials they typically use the account for various things.

From

Popular posts from this blog

New Micro battery, power packed for high performance

For a size of a few millimetres, the new micro-batteries are powerful enough to jump start a car battery and then quickly charge the cell phone. Researchers from the University of Illinois have developed the micro batteries which can be used to drive compact electronic devices and new applications for radio communications. The micro batteries are so good that they can even out power the super capacitors. The results were published in ‘Nature Communications’ in the April 16 issue. The micro batteries have energy and power and with the researchers tweaking the structure of the micro batteries a little bit, its use can be for wide range applications.

The high performance of the micro battery is based on its 3-dimensional micro-structure. Based on the design of fast charging cathode by Professor Paul Braun’s group, researchers developed the matching anode and integrated it with the fast charging cathode at a micro-scale and made a complete battery with high performance. These batteries cou…

HTC Touch Diamond SmartPhone!

The phones design is an innovative in which the user has the geometric form language to make sure a clutter-free environment for screening content. The San Francisco based studio One & Co collaborated with HTC Taiwan Design team to create Diamond HTC smartphone.







The HTC phone is quite wonderful with design and the rapid development in the smartphone market the HTC has taken innovative steps to capture the SmartPhone market HTC develops these kind of new inventive designs.
Inspired

How to Automatically Convert any RSS Feed to an iPhone Web app!

For iPhone users this is another web app which converts any well formed XML RSS feed to an iPhone version. It is possible because it is worked with the typical sliding style interface to suit the iPhone optimized version. For instance if you had the iPhone right now here is the Google News Feed




Jim Liddle, one of the creators of the service, told iPhone Atlas “You can book mark the generated site and use it to host your own content and reference it from your own. It seems that these feed on your iPhone is quiet usable.