Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.
Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords.
Usually after getting an email like the ones mentioned above from reputable companies, most of us would race to respond as quickly as possible. However, in most cases you will find that you won't be helping anyone other then the criminal who wrote that email and who has nothing to do with the actual organizations.
What is Phishing?
It is when someone creates false email that pretends to be from a bank or other authority, but which is actually designed to collect sensitive information such as passwords. This process of stealing information used for fraudulent purposes is the latest problem to plague Internet users. It is a phenomenon know as phishing i.e. emails 'fishing' for important information.
Just like Spam, phishing mails are sent to the widest possible audience so it's not unusual to receive a message asking you to confirm account details from an organization you do not actually deal with. You may be asked to fix up your eBay account when you haven't even got one!
In addition to collecting sensitive information many phishing messages try to install spy ware, Trojans etc. allowing hackers to gain backdoor entry into computers.
Types of Phishing Emails:
Some phishing emails ask for a response by email.
Some emails include a form for collecting details that you are told to fill out.
Some even include a link to a web site that resembles the actual site you expect to visit, but is actually a clone of the original site.
Number of active phishing sites reported in March, 2005: 2870
Number of brands hijacked by phishing campaigns: 78
Contains some form of target name in URL: 31%
Country hosting the most number of phishing sites: United States of America
Source: http://www.antiphishing.org
Phishing attacks can be really sophisticated. Some time ago a flaw in Internet Explorer allowed hackers to display a false address while redirecting the user to an entirely different site making it almost impossible to distinguish a phishing attack from a legitimate email.
Possible solutions:
New technologies can provide a better means of countering phishers. One option being explored by a lot of banks is the use of a secure token, a small electronic gadget that generates a unique password to be entered each time a user logs onto the web site. This would make a phishing attack useless because without the physical possession of a token it is impossible to access the account. This approach is somewhat similar to what is used at Automated Teller Machines around the world where you need to have both the card and the Pin number in order to use the machine.
One option is to use a technology popularly knows as PassMarks that effectively acts as a second password. After entering the user name a unique image pre selected by the user is displayed before s/he is asked for the password. If the proper image is not displayed the user will come to know that s/he is not on the authentic site. Another option that a lot of organizations are exploring is using text messages instead of email messages. Text messages cost money to send, so Spammers are less likely to partake in the process making it easier to distinguish between legitimate messages and fakes.
Ashish Jain
M6.Net Web Helpers http://www.m6.net
When it comes to reporting Internet scams most of us... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Threats we ordinary Web users face online leave us no... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
A couple of years back, I paid my dues the... Read More
Nowadays more and more people are using a computer. A... Read More
In a word, no - an email message has always... Read More
I am the victim of an internet scam. It is... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
A friend called me one day and asked if I... Read More
If you use emails actively in your communication, you must... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
When the Internet first came about, it was realized it... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If spyware were a person and he set himself up... Read More
A new variation of the Nigerian Scam theme ... Read More
This really chapped my lips...I recently bought a new computer.... Read More
First I would like to stress I am condoning the... Read More
We all get the odd virus now and then, but... Read More
To blog or not to blog? Well, why not? Lots... Read More
Much has been said on the theory of password protection... Read More
Business on the internet is getting down right shameless. This... Read More
You've seen it in the news - 40 million credit... Read More
Someone recently told me, "You would have to be a... Read More
If you are a parent, as am I, I think... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Have you ever got an email asking you to confirm... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Much has been said on the theory of password protection... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Huge number of spyware software applications are available in the... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Only the top spyware removers are successful at detecting and... Read More
If you are wondering how to fight spyware for safe... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Long gone are the days that we could feel secure... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
A new variation of the Nigerian Scam theme ... Read More
This is not some new fangled techno-speak, it is a... Read More
You are at your computer, checking out software on EBay.... Read More
There are ways to insure security though. You can get... Read More
With the advent of the World Wide Web, a whole... Read More
When we think of adware, what comes to mind are... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
You and I are a lot alike. We are both... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Ebay is a great site and is used by many... Read More
Identity theft rates one of the fastest growing crimes in... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
History and BackgroundThe virus was one of the first ever... Read More
Imagine this ? you open up your email box and... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Over the past few years as the internet has become... Read More
In today's times spyware is a very serious issue and... Read More
Internet Security |