Phishing: Difference between revisions - Wikipedia


Article Images

Content deleted Content added

m

Line 3:

[[File:PhishingTrustedBank.png|right|300px|thumb|An example of a phishing email, disguised as an official [[email]] from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the ''phisher'''s website. Note the misspelling of the words ''received'' and ''discrepancy''. Also note that although the [[URL]] of the bank's [[webpage]] appears to be legitimate, the hyperlink would actually be pointed at the phisher's webpage.]]

''' Phishing''' is the attempt to acquire [[Information sensitivity|sensitive information]] such as usernames, [[password]]s, and [[credit card]] details (and sometimes, indirectly, [[money]]), often for malicious reasons, by masquerading as a trustworthy entity in an [[electronic communication]].<ref>{{cite book|authors=Ramzan, Zulfikar|chapter=Phishing attacks and countermeasures|editors=Stamp, Mark & Stavroulakis, Peter|title=Handbook of Information and Communication Security|publisher=Springer|year=2010|isbn=9783642041174|url=http://books.google.com/books?id=I-9P1EkTkigC&pg=PA433}}</ref><ref>Van der Merwe, A J, Loock, M, Dabrowski, M. (2005), Characteristics and Responsibilities involved in a Phishing Attack, Winter International Symposium on Information and Communication Technologies, Cape Town, January 2005.</ref> The word is a [[neologism]] created as a [[homophone]] of ''[[fishing]]'' due to the similarity of using fake [[Bait_(luring_substance)|bait]] in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with [[malware]].<ref name=Google /> Phishing is typically carried out by [[email spoofing]]<ref name=DMARC>{{cite web | title=Landing another blow against email phishing (Google Online Security Blog) | url=http://googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html | accessdate = June 21, 2012}}</ref> or [[instant messaging]],<ref>{{cite web

| author=Tan, Koontorm Center

| title = Phishing and Spamming via IM (SPIM)