What is a fraud with phishing?
phishing fraud is a fraud in theft of an identity that arrives with e -mail. It seems that e -mail comes from a legitimate source, such as a trusted business or financial institution, and includes an urgent request for personal data that usually causes any critical need to immediately update the account. By clicking on the link provided in the e-mail, he leads to the official website. However, personal data provided to this site goes directly to a fraudulent artist. Virus and firewalls do not capture most of phishing fraud because they do not contain a suspicious code while spam filters let them go because they seem to come from legitimate sources. that we look at the place itself. However, traces at the address can sometimes detect fraud.
similar looking characters could be replaced by a spelling link for a real character so that instead of "L." used "1" (numeric one) on the site "L." For example, Phishers used PayPa1.com rather than paypal.com. Other times, the IP address - numeric address - to hide the fact that the link does not take the victim to the real place. However, phishing fraud has become so sophisticated that Phishers may also seem to use legitimate links to the security certificate of the real site.
The best way to someone can protect themselves from the phishingEmprovs should avoid the provision of personal data on an e -mail request. If the application could be legitimate, the Customer Service Department should be called to verify the application before providing any information; No phone numbers contained in e -mail, if included, should not be used. Although the request is legitimate, one should manually enter the desired address in the browser rather than click on the link, thereforeThat fraud with Phisher could run in parallel with the legitimate trade trade.
For example, at the beginning of April 2005, the mass e -mail, which seemed to be from Microsoft Corporation, called on the recipient to download a much -awaited security update. Those who clicked the link in the e -mail were transported to a website that looked like a legitimate Microsoft update site. Instead of updating their software, however, the Trojan Horse - a remote access program that can steal personal data. Microsoft does not use e -mail notifications in this way, but many users have been caught unconscious.
The famous "letter from Nigeria" was another type of phishing fraud. This type of fraud is thus predominant, has its own name: 419 fraud. Phisher pretends to be a Nigerian need in need that requires the US bank account to interpret money. A person who allowed temporary use of their account would receive a nice reward. Instead of those who pissYtli of his bank information will become victims of theft.
In the US, the Federal Business Commission (FTC) and others focused on public education in the fight against fraud with phishing, because catching phishers is difficult. Fraud plants work for a very short time and fraud are often operated from other countries. In March 2005, Microsoft submitted 117 phishing of lawsuits in the Western Washington district with the most noticeable defendants.
The PHISHING (APWG) working group is an international organization of volunteers working on watching phishing fraud. Their websites maintainingeline databases of fraudulent e -mails that have been presented to them. You can see this site whether there are new fraud or send them the e -mail with the Phisher you will receive. APWG is largely an information center, but provides links to consumer resources. FTC also has advice for consumers, e -mail address for reporting phishing, on their website.