Technology Computer & Networking security

Your “Phished” Stolen Data Could End up on the Web

What is "Phishing"?

Phishing is the process where an attempt is made to fraudulently extract sensitive information from someone, such as credit card details, user name and password, using electronic communication.

Users are often deceived by Instant messaging or an email which directs them to a false website, where they are asked for sensitive information. These requests often come from popular websites like Facebook, MySpace, eBay, Yahoo, etc.

Another part of this fraudulent process is achieved by "keylogging". This is where keystrokes and mouse operations are recorded, and screen shots are captured enabling access to the Protected Storage Area in Windows where Internet Explorer stores passwords. According to the Anti-Phishing Working Group, the number of keylogger programmes has more than doubled in one year to 180.

Stolen Data

Security researchers are concerned that identity thieves and hackers are not just using keyloggers to steal sensitive information but the information captured in this way is often placed on unprotected FTP sites where it is available to anyone who encounters it. These servers are packed with stolen information from all over the world and in many languages. The information held includes Hotmail, Yahoo and other email account information, IP addresses, other usernames and passwords, etc. Criminals use complex methods to sift through the data to find what they are looking for.

Despite the obvious dangers many people neglect PC security and use their PC without anti-virus protection or spam blockers. If your PC is unprotected, criminals can use unknown programmes on your PC to contact the web. Therefore, it is essential that your firewall is capable of protecting your PC from this type of danger - not all built-in firewalls do. You should re-use your passwords but avoid using the same password and username at different sites. You should also note the following safeguards.

- Don't react to urgent or excitable requests for personal information. Remember that banks do not ask for password details via email.
- Don't click on embedded links - type the website address directly into the web browser. Contact your bank if you are suspicious.
- Note that e-commerce companies usually personalize their emails. Always check the website address line to verify.
- Criminals are now replicating the "http://" that appears when you are on a secure server. They are also duplicating the yellow lock that appears at the bottom of the page which contains the security certificate number for the site. If you get a message saying that the security certificate number does not match the site address you should close your browser.
- Install a web browser toolbar that identifies and protects you from known phishing websites.
- Report all phishing attempts as soon as possible.
SHARE
RELATED POSTS on "Technology"
Use Online Backup to Keep Your Valuable Data Safe
Use Online Backup to Keep Your Valuable Data Safe
'Problem occurred while doing OST sync operation' Error and Recovery
'Problem occurred while doing OST sync operation' Error and Recovery
Data Recovery - Important Factors to Consider
Data Recovery - Important Factors to Consider
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Speed Up XP Software - Download Right Now!
Speed Up XP Software - Download Right Now!
The Right Time To Use A Registry Cleaner Windows XP Optimizer
The Right Time To Use A Registry Cleaner Windows XP Optimizer
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
How to Get Rid of Spyware on My Computer
How to Get Rid of Spyware on My Computer
How to Avoid a Malware Infection?
How to Avoid a Malware Infection?
Outstanding Registry Cleaner
Outstanding Registry Cleaner
Why You Should Be Using Vipre Internet Security?
Why You Should Be Using Vipre Internet Security?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
How to Remove Virus Protector Spyware Automatically-Manually
How to Remove Virus Protector Spyware Automatically-Manually
Data Recovery of IBM Drive
Data Recovery of IBM Drive
What Are the Best Registry Cleaners For Windows?
What Are the Best Registry Cleaners For Windows?
Protect Your Laptop and the Data It Holds
Protect Your Laptop and the Data It Holds

Leave Your Reply

*