what are the advantages and disadvantages of phishing
#1

advantages and disadvantages of phishing
Reply
#2
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting victims. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.

Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Google+. Hackers could create a clone of a website and tell you to enter personal information, which is then emailed to them. Hackers commonly take advantage of these sites to attack people using them at their workplace, homes, or in public in order to take personal and security information that can affect the user or company (if in a workplace environment). Phishing takes advantage of the trust that the user may have since the user may not be able to tell that the site being visited, or program being used, is not real; therefore, when this occurs, the hacker has the chance to gain the personal information of the targeted user, such as passwords, usernames, security codes, and credit card numbers, among other things.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: phishing advantages, usernames on twitter, advantage and disadvantages of phishing, phishing advantages seminar, disadvantages of phishing, advantages and disadvantages of phishing, advantages disadvantages phishing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  well-spring some homemade barbecue backchat and moistureless rubs and the actuality 0 1,037 10-09-2019, 05:48 PM
Last Post:
  agent some homemade barbecue cheek and prosaic rubs and suit 0 959 10-09-2019, 07:04 AM
Last Post:
  pass some homemade barbecue coolness and arid rubs and module 0 911 09-09-2019, 06:35 PM
Last Post:
Wink disadvantages of plastic in malayalam essay 2 2,442 29-12-2018, 06:07 AM
Last Post:
  disadvantages of smart dustbin 0 646 27-10-2018, 03:47 PM
Last Post: Guest
  foot step bearing information advantages disadvantages application 0 686 21-10-2018, 08:54 PM
Last Post: Guest
  advantages n disadvantages of bhakra dam 0 662 03-10-2018, 08:04 PM
Last Post: Guest
  advantages and disadvantages mains failure alarm circuit in pdf 0 785 01-10-2018, 11:48 PM
Last Post: Guest
  advantages and disadvantages of natural resources wikipedia 0 678 20-09-2018, 03:09 PM
Last Post: Guest
  advantages of credit creation by commercial banks 0 765 26-08-2018, 07:03 PM
Last Post: Guest

Forum Jump: