Phishing is a method used by hackers to steal personal information through deceptive means such as spam or fake websites. There are many types of phishing techniques, including instant messaging links to fake websites, trojan hosts, key loggers to steal passwords, session hacking to intercept web session information, fake search engine results linking to phishing sites, phone calls asking users to input bank details, and malware attached to emails or downloads to steal data from victims' computers. It is important for users to be aware of these techniques to protect themselves from phishing attacks.
3. is the method used to steal personal
information through spamming or other deceptive
means. There are a number of different phishing
techniques used to obtain personal information
from users. As technology becomes more
advanced, the phishing techniques being used are
also more advanced. To prevent Internet phishing,
users should have knowledge of various types of
phishing techniques and they should also be
aware of anti-phishing techniques to protect
themselves from getting phished. Let’s look at
some of these phishing techniques.
12. Instant messaging is the method in which the user
receives a message with a link directing them to a fake
phishing website which has the same look and feel as
the legitimate website. If the user doesn’t look at the
URL, it may be hard to tell the difference between the
fake and legitimate websites. Then, the user is asked
to provide personal information on the page.
21. Key Loggers refer to the malware used to identify
inputs from the keyboard. The information is sent to
the hackers who will decipher passwords and other
types of information. To prevent key loggers from
accessing personal information, secure websites
provide options to use mouse click to make entries
through the virtual keyboard.
27. In session hacking, the phishers exploits the web
session control mechanism to steal information from
the user. In a simple session hacking procedure known
as session sniffing, the phishers can use a sniffer to
intercept relevant information so that he or she can
access the Web server illegally.
30. Some phishing scams involve search engines where
the user is directed to products sites which may offer
low cost products or services. When the user tries to
buy the product by entering the credit card details, it’s
collected by the phishing site. There are many fake
bank websites offering credit cards or loans to users at
a low rate but they are actually phishing sites.
31. In phone phishing, the phishers makes phone calls to
the user and asks the user to dial a number. The
purpose is to get personal information of the bank
account through the phone. Phone phishing is mostly
done with a fake caller ID.
33. Phishing scams involving malware require it to be run on the
user’s computer. The malware is usually attached to the
email sent to the user by the phishers. Once you click on the
link, the malware will start functioning. Sometimes, the
malware may also be attached to downloadable files.
Phishers take advantage of the vulnerability of web security
services to gain sensitive information which is used for
fraudulent purposes. This is why it’s always a good idea to
learn about the various phishing techniques, including
phishing with Trojans and Spyware.