Phishing attacks

This article explains about phishing attacks in general and suggestions for minimizing phishing attacks.

Phishers attempt to fraudulently acquire information such as passwords and credit card details by presenting them self as trustworthy or other business related persons.
Phishing in general is carried out by using email or an instant message, although phone contact was used as well. Attackers in general have a bag of “tricks” from which they construct their attack.

There are different possibilities of minimizing phishing attacks and some suggested “best practices in domain naming and host service are available on the article link.

Read more about phishing attacks on the following link.

This entry was posted in IT Security, Week 15. Bookmark the permalink.

One Response to Phishing attacks

  1. Pingback: Crimeware | EAL IT technologist (2010 Autumn)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s