Phishing - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Phishing

Description:

... Field' appears to be from the legitimate company mentioned in the e-mail. ... logos or images that have been taken from the Web site of the company mentioned ... – PowerPoint PPT presentation

Number of Views:67
Avg rating:3.0/5.0
Slides: 11
Provided by: www2H7
Category:

less

Transcript and Presenter's Notes

Title: Phishing


1
Phishing
  • By Denise Ching

2
What is it?
  • The act of sending an e-mail to a user falsely
    claiming to be an established legitimate
    enterprise in an attempt to scam the user into
    surrendering private information that will be
    used for identity theft. The e-mail directs the
    user to visit a Web site where they are asked to
    update personal information, such as passwords
    and credit card, social security, and bank
    account numbers, that the legitimate organization
    already has. The Web site, however, is bogus and
    set up only to steal the users information.

3
Example
4
  • 1. The "From Field" appears to be from the
    legitimate company mentioned in the e-mail. It is
    important to note, however, that it is very
    simple to change the "from" information in any
    e-mail client.
  • 2. The e-mail will usually contain logos or
    images that have been taken from the Web site of
    the company mentioned in the scam e-mail.
  • 3. The e-mail will contain a clickable link with
    text suggesting you use the inserted link to
    validate your information. In the image you will
    see that once the hyperlink is highlighted, the
    bottom left of the screen shows the real Web site
    address to which you will go. Note that the
    hyperlink does NOT point to the legitimate
    Citibank Web site URL.

5
Web Phishing Attack Trends in February 2007
  • The top three countries in February 2007 hosting
    phishing sites are the United States (25.17),
    China (10.16), and the Republic of Korea (9.5).

6
Tips
  • Watch for phishing emails.
  • Dont click on links asking for personal
    information.
  • Be careful of pharming.
  • Do not enter personal information on pop-up
    screens
  • Use spam filters, anti-virus, anti-spyware
    software, and a fire wall to protect your
    computer (keep them up to date).
  • The lastest version of identity theft where a
    virus is secretly put in your computer and takes
    your web browser. When typing the address of a
    legitimate site, you are taken to a fake site.

7
More Tips
  • Be aware that phishing can happen over the phone.
  • Open email attachments only if youre expecting
    them and you know what they contain.
  • Report phishing, victim or not.
  • Act immediately if hooked by a phisher. If told
    you are a victim of fraud, verify the persons
    identity before giving information.

8
  • Deter. Detect. Defend. Avoid ID Theft
  • cnet

9
Summary
  • Phishing leads to identity theft.
  • The United States was the top phishing host
    country in February 2007.
  • Phishing can occur over the phone.

10
Works Cited
  • Jupitermedia Corporation. All about Phishing.
    2006. 1 May 2007 now/Internet/2005/phishing.asp.
  • Anti -Phishing Working Group. Phishing Activity
    Trends Report for the Month of February, 2007.
    2007. 1 May 2007 orts/apwg_report_february_2007.pdf.
  • National Consumers League. Internet Fraud Tips
    from the National Consumers League's Internet
    Fraud Watch. 2007. 1 May 2007 rg/tips/internet/phishing.htm.
Write a Comment
User Comments (0)
About PowerShow.com