Difference between revisions of "Phishing"
(Created page.) |
Bob Zenith (talk | contribs) |
||
Line 1: | Line 1: | ||
[[File:Phish_mail.PNG|200px|thumb|right|A typical phishing email]] | [[File:Phish_mail.PNG|200px|thumb|right|A typical phishing email]] | ||
− | '''Phishing''' is the term used to describe the process of attempting to fraudulently | + | '''Phishing''' is the term used to describe the process of attempting to fraudulently acquire confidential information such as user-names, passwords and credit card numbers by pretending to be a trusted organization that the user recognizes. |
− | Phishing is usually carried out using e-mail or instant-messanging services, and pretend to be from an | + | Phishing is usually carried out using e-mail or instant-messanging services, and pretend to be from an organization that is well known to the user, such as a bank, online payment processor (e.g. PayPal), auction site (e.g. eBay), social networking site (e.g. Facebook) or even the IT administrator of their employer or ISP. These phishing communications will typically direct users to enter their details at a fake website which bears a strong resemblance to the website of the organization they are masquerading as. |
If a user enters details into a Phishing website, such as their username, password, or other confidential information, it will most likely be used by criminals to steal their identity. | If a user enters details into a Phishing website, such as their username, password, or other confidential information, it will most likely be used by criminals to steal their identity. |
Revision as of 23:40, 14 January 2010
Phishing is the term used to describe the process of attempting to fraudulently acquire confidential information such as user-names, passwords and credit card numbers by pretending to be a trusted organization that the user recognizes.
Phishing is usually carried out using e-mail or instant-messanging services, and pretend to be from an organization that is well known to the user, such as a bank, online payment processor (e.g. PayPal), auction site (e.g. eBay), social networking site (e.g. Facebook) or even the IT administrator of their employer or ISP. These phishing communications will typically direct users to enter their details at a fake website which bears a strong resemblance to the website of the organization they are masquerading as.
If a user enters details into a Phishing website, such as their username, password, or other confidential information, it will most likely be used by criminals to steal their identity.