Tag: spyware blockers

Jun
14

All About Phishing: The Origin Of The Term, Its Classification.

by , under Uncategorized

Phishing – is targeted espionage action of fraudsters to obtain confidential financial information by phishing user’s data via email or luring its victim on the site that is an exact copy of the internet banking or other financial institution.

It is interesting the origin of the term phishing. Most sources refer to the English word fishing, which in translation means to catch fish that is just suited for Internet fraud. The only thing that remains unclear why instead of the first letter f it is used letter combinations ph.

Definitely when it comes to catch fish, it is used the word fishing, and when we mean phishing in the Internet, it is used the term phishing.

In the popular Internet encyclopedia “Wikipedia” this fact is explained by the fact that the term phishing comes from two words: password and fishing, i.e. password phishing. Such an explanation of the appearance of the term seems to be quite logical, but here is no letter «h» in the word password and in this case it is not clear where this letter come from in the term phishing.

The assertion that the formative words of the term phishing, which determines spyware action for phishing of personal financial data of Internet users, are the two English words: phreaker and fishing.

Specialized terms phreaker is too hard to find in dictionaries, because it is slang, used to identify people who had studied the structure of telephone lines and using their knowledge for illegal activities. In other words phreakers are phone hackers.

However we too carried away with philological studies of appearance the word phishing and let’s talk about the technologies that phishers use to achieve their selfish goals.

Briefly, the essence of phishing is that the attacker tries to fraudulently extract from the user computer confidential personal and financial information such as usernames, passwords, credit cards, codes to enter the online banking and much more.

Currently phishing technology can be divided into three main groups: e-mail, network (online), and combined.

A few years ago the most common form of phishing was e-mail. Using this technology, fraudsters using the name and the letterhead of the well-known Internet bank or other financial institution, send information by e-mail about for example, due to a failure in the database it have been irrevocably destroyed the customer’s data. It is further proposed to send the required data, often electronic form with the logo of the bank is attached for greater reliability and confidence.

The mechanism of the network (online) phishing is pretty simple. Cyber criminals copy in advance most popular Internet shops, having the confidence of buyers. Using similar domain names and identical design, they placed on them goods which are in demand by deliberately low prices. Caught in a store, the potential victim is recorded for a purchase and enters data of his credit card.

Combined method of phishing uses the advantages of both methods.

Despite the simplicity of technology phishing, trusting customers come across and continue to keep out the bait and give voluntarily their personal financial data to attackers.

If you need to get a nice remove spyware program or any helpful information about the topic of spyware removers, please visit the hyperlinked web site.

And it is very important that you follow a final piece of advice – today the web technologies give you a really unique chance to choose what you require for the best price on the market. Funny, but most of the people don’t use this chance. In real life it means that you must use all the tools of today to get any info that you need.

Search Google or other search engines. Visit social networks and check the accounts that are relevant to your topic. Go to the niche forums and participate in the discussion.

All this will help you to build up a true vision of this market. Thus, giving you a real opportunity to make a smart and nicely balanced decision.

And also sign up to the RSS on this blog, because we will do the best to keep this blog tuned up to the day with new publications about the market of spyware removers and any changes on it.

Comments Off on All About Phishing: The Origin Of The Term, Its Classification.read more
© Copyright Aubrey's Corner 2009. All rights reserved. | Powered by Wordpress | Designed by ThemesGuy