Saturday, June 21, 2008

Phishing: Examples and its prevention methods

Phishing is one of the 21st century crimes. Phishing is an online fraud technique used by criminals to acquire sensitive or private personal information, such as usernames, passwords and credit card details. It uses social engineering to create a misrepresented electronic identity to attack individuals. It is typically carried out by e-mail and often directs users to enter their details information at a website to steal users personal identity data financial account information. Online credit card banks, e-commerce online shopping site, or bank charity are the target of phishing.

The table below shows the example of how phishing attacks users to get their personal information:

1. Example of phishing e-mail attacks PayPal users.

The clues to know the phishing attempt is the spelling mistakes (http://www.paypal.com/securitytips) in the e-mail address and the presence of an IP address in the link under the yellow box. As we know, the e-mail address should include the symbol of ‘@paypal.com’. Moreover, there is lack of personal greeting and the threat of ‘account suspension’ if the recipient fails to comply with the message requirement.

http://en.wikipedia.org/wiki/Image:Paypal_Phishing.png

2. Example of phishing scam e-mail message attacks Woodgrove bank.

From the table below, there is also the spelling mistake of e-mail address and the URL address which will link the users to the ‘spoofed’ websites (copycat sites) and the people who sent the fake website will have the users account information.


http://www.microsoft.com/protect/yourself/phishing/identify.mspx

In order to prevent the disclosure of personal information, there are several ways to protect our information from the attack of phishing:

1. Users are advised that never reply to e-mail messages that request your personal information. If you do reply the message which has the characteristics of the table above, you are allowed the people to have all of your account information.
2. Do not click links in suspicious e-mail if you have doubt the website is fake. You should visit the website by typing the URL address into browser and be avoided that do not copy and paste the links from the suspicious message into the browser.
3. Make business transactions with the companies that we are know and trust. A well-known, established company will set up the privacy security tools to protect their customers’ information access by others.
4. Monitor your transaction. Users are advised that to review the bank statement or the order confirmations as we have received them. This is to make sure that the amount charged in the statement is the transaction that we made recently.

This is some of the ways to protect users’ personal information. There is still having many ways that can avoid the attack of pushing. The most important way to prevent the phishing is the awareness of users when they are using their e-mail.

No comments: