You are here: Home / Phishing Attacks / Here are the few Phishing techniques

Here are the few Phishing techniques

Here are the few Phishing techniques….

  • Social networking sites are now a prime target of phishing, since the personal details in such sites can be used in identity theft.

  • One of the latest phishing techniques is tabnabbing. It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.

Filter Evasion

Phishers have used images instead of text to make it harder for  anti-phishing filters to detect text commonly used in phishing e-mails.
Phone Phishing

Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

Another attack used successfully is to forward the client to a bank's legitimate website, then to place a popup window requesting credentials on top of the website in a way that it appears the bank is requesting this sensitive information

How I can recognize a message of phishing?

  • Normally phishing e-mails display grammatical errors or overlapped text.

  • Test using false data before putting in actual information.

 What should I do if I think I've responded to a phishing scam?

Take these steps to minimize any damage if you suspect that you've responded to a phishing scam with personal or financial information or entered this information into a fake website.

  • Change the passwords or PINs of all your online accounts that you think could be compromised.

  • Place a fraud alert on your credit reports. Check with your bank or financial advisor if you're not sure how to do this.

  • Contact the bank or the online merchant directly. Do not follow the link in the fraudulent e-mail.

  • Routinely review your bank and credit card statements for unexplained charges or inquiries that you didn't initiate.

Animated Videos

Download Brochures

Related Links
Incident Reporting

To report cyber incident, please visit,
http://www.cert-in.org.in

This is Schools Diazo Plone Theme