Main Menu

Our Partners


Authorized Pearson Vue Test Center



TESDA
Live Online Training


Live CCNA Remote lab

Contest

  

CNCTC Articles - Excellence in IT TRAINING

Phishing: The High- Tech Way of Stealing

by: Tesa Mari S. Sabao | 13 Jun, 2010 13:13:49

Article Word Count: | Viewed: times


Taken from the word, “fishing”, phishing are hackers’ ways of catching passwords and user names for self-interests. The mode of operation is easy and hard to detect. If you’re not careful enough, expect your bank account to be empty. As of the moment, they’ve already stolen massive amount of funds using internet.

What Phishers Do?

Have you received any email from a friend saying you have a picture or video on web? Be careful. Though the message is addressed from a reliable person, the email account might have been entered by phishers. Most likely, they will lead you to click on a link they’ve provided. Clicking the link secretly downloads software, creating a pop up window mimicking popular websites like Yahoo, Google, Facebook, and others.  Phishers will have your username and password, once you’ve log in the fake website. Just imagine how they can do once they gain access on your email account: access your bank accounts and online funds, or even send messages to lure your contacts in giving them money or accessing their email account as well. Very contagious, isn’t it? The range of what they can do is really alarming.

Phishers-Proofing Checklist

Here’s what you can do to prevent phishers from preying on you.

  1. Avoid clicking links from emails or suspecting websites. Even scanning while loading won’t help as phishers have their way on hiding software downloads using pictures and videos. The reason why you have to suspect more on pictures’ and videos’ links.
  2. Be aware of online subscription. Make sure these entities really exist and not a phisher’s bait.
  3. If you have received message from financial institution or any entity that asks for information, contact them back for confirmation using their legitimate websites or telephone number.
  4. Change log in passwords regularly.
  5. Create sign in seals or security word for websites you always use to detect fake websites from real ones.
  6. If you cannot get through a website account using your same correct password and user name, or your email was used in sending a message without your knowledge; contact the website administrator. There is a big possibility, phishers got through your account.

Having the knowledge of how phishing and other economic crimes happen, make it possible to stop them. It is already a big help if you’ll make others aware as well. This will lessen the number of possible victims, and limit if not eliminate the damages they cause. Comes along with the perks of technology are its abuse. Everyone nowadays should be vigilant, as economic sabotage and stealing has also evolved faster and more massive with the use of technology.


Protected by Copyscape Originality Checker





Other Related Topics..
« Prev item - Next Item »
---------------------------------------------


What do you think?

Leave comment

This item is closed, it's not possible to add new comments to it or to vote on it

Comments

No comments yet. You can be the first!

  
CNCTC Live Chat Inquiry

Subscribe

Stay Informed Subscribe

Name *

Email *