All About Phishing (網路釣魚)

‧本文由 Valerie_cv1976 分享 ‧ 2006-09-24 ‧ 顯示 4,955 次 ‧ 轉寄 3 次 ‧ 短評 3 篇 ‧
It is becoming increasingly common to tune in to the news or load your favorite news Web site and read about yet another Internet e-mail scam. An e-mail scam is a fraudulent e-mail that appears to be from a legitimate Internet address with a justifiable request — usually to verify your personal information or account details. One example would be if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Usually there will be a repercussion stated in the e-mail for not following the link, such as "your account will be closed or suspended". The goal of the sender is for you to disclose personal and (or) account related information. This type of e-mail scam is also called phishing.

How to Spot A Phishing Scam
At first glance, it may not be obvious to the recipients that what is in their inbox is not a legitimate e-mail from a company with whom they do business. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail, and the clickable link may also appear to be taking you to the company's Web site, but will in fact take you to a spoof Web site. Looks can be deceiving, but with phishing scams the e-mail is never from who is appears to be!

Phishing e-mails will contain some of these common elements: (view screen capture above from Eudora)
  1. The "From Field" appears to be from the legitimate company mentioned in the e-mail. It is important to note, however, that it is very simple to change the "from" information in any e-mail client. While we're not going to tell you how, rest assured it can be done in a matter of seconds!
  2. The e-mail will usually contain logos or images that have been taken from the Web site of the company mentioned in the scam e-mail.
  3. The e-mail will contain a clickable link with text suggesting you use the inserted link to validate your information. In the image you will see that once the hyperlink is highlighted, the bottom left of the screen shows the real Web site address to which you will go. Note that the hyperlink does NOT point to the legitimate Citibank Web site URL.
In this instance, the text you click is "here", However, this may also state something like "Log-in to Citibank" or "www.citibank.com/secure" to be even more misleading. This clickable area is only text and can be changed to anything the sender wants it to read.

Additionally, you may spot some of these elements that did not appear in this particular scam:

Logos that are not an exact match to the company's logo, spelling errors, percentage signs followed by numbers or @ signs within the hyperlink, random names or e-mail addresses in the body of the text, or even e-mail headers which have nothing to do with the company mentioned in the e-mail.

Who Is Behind the Phishes & Why
The people behind phishing e-mails are scam artists. They literally send out millions of these scam e-mails in the hopes that even a few recipients will act on them and provide their personal and financial information. Anyone with an e-mail address is at risk of being phished. Any e-mail address that has been made public on the Internet (posting in forums, newsgroups or on a Web site) is more susceptible to phishing as the e-mail address can be saved by spiders that search the Internet and grab as many e-mail addresses as they can. This is why phishing is profitable for scammers; they can cheaply and easily access millions of valid e-mail addresses to send these scams to.

Common (Phish) Sense
After reading this far, we hope that you will be able to spot a phishing e-mail without too much difficulty. The e-mail represented above is just a sample; phishing e-mails can appear to be from any bank, PayPal, eBay, credit card companies, an online retail store — basically from anywhere a person may have registered for an account, and usually would have supplied financial information when registering.

The golden rule to avoid being phished is to never ever click the links within the text of the e-mail. Always delete the e-mail immediately. Once you have deleted the e-mail then empty the trash box in your e-mail client as well. This will prevent "accidental" clicks from happening as well. If, for some really odd reason you have this nagging feeling that this could just possibly be a legitimate e-mail and nothing can convince you otherwise, you still need to adhere to the golden rule and not click the link in the message. For those truly worried that an account may be in jeopardy if you do not verify your information, you need to open your Web browser program of choice and type the URL to the Web site in the address field of your browser and log on to the Web site as you normally would (without going through the e-mail link as a quick route). This will provide you with accurate information about your account and allow you to completely avoid the possibility of landing on a spoof Web site and giving your information to someone you shouldn't.

Now that you know how to avoid being phished, there is still the question of what to do about phishing e-mails should you be a recipient of them. First of all, you can visit the Web site of the company from whom the e-mail appears to be from and take the time to notify them of the suspicious e-mail. Many companies do want to know if their company name is being used to try and scam people, and you'll find scam and spoof reporting links within some of these Web sites. Additionally, you can report phishing to the Federal Trade Commission (FTC), and depending on where you live, some local authorities may also accept Internet phishing scam reports. Lastly, you can also send details of a phishing scam to to the Anti-Phishing Working Group who is building a repository/database of common scams to help inform people of the risks.

The New Phish - Spear Phishing
As with all malicious code, once a small percentage of the population starts to catch on, the perpetrators find ways to make the attack a little different, and this case, make the phish harder to net. The newest type of phishing scam is one that focuses on a single user or a department within an organization. The Phish appears to be legitimately addressed from someone within that company, in a position of trust, and request information such as login IDs and passwords. Spear phishing scams will often appear to be from a company's own human resources or technical support divisions and may ask employees to update their username and passwords. Once hackers get this data they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can steal data.

Did You Know...
The word phishing comes from the analogy that Internet scammers are using e-mail lures to fish for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replacing "f" with "ph" the term phishing was derived.

decoration
0.00 0 votes
1
3
5
7
9
請按數字進行評分

Plurk 噗浪請以1~9的評分代表由負面到正面的感受,統計數據將決定資訊的參考價值。謝謝!

寄件者: 為避免成為廣告信跳板,本功能限會員使用!加入會員
收件者:
留言:
 
forward collect
collect title
collect button
  •  網路
  •  Phishing

keword icon
關鍵字建檔說明
  1. 關鍵字是您認定內容相關性或方便記憶、搜尋的用詞。
  2. 以名詞為主,避免用詞習慣的差異。
  3. 設定欄位上方為目前的關鍵字詞及得票數。
  4. 被勾選的關鍵字代表您所投的認同票。
  5. 您可勾選這些選項,或由設定欄中新增更多關鍵字。
  6. 新增關鍵字時,請以空白或斷行來區隔關鍵字。
為了更容易取得相關資訊,請大家協助建檔,謝謝!
顯示/隱藏 列印 列印提示
  1. 您可以點擊右方的「顯示/隱藏」鏈結來隱藏不相關的內容。
  2. 內容確認後,點擊右方的「列印」鏈結或瀏覽器之列印鍵即可。
  3. 完成後,顯示被隱藏的內容即可繼續瀏覽。
◎附加檔案 中的附件有三種不同的呈現方式,均限會員使用
  1. 圖檔類型 以縮圖方式呈現,點縮圖後會浮現原尺寸圖檔!
  2. 檔案類型 以檔名方式呈現,建議先另存新檔,再開啟瀏覽!
  3. FLV類型 支援線上瀏覽模式,請按檔名前方的圓型箭頭;按檔名則是另存新檔。
  4. 檔案開不了怎麼辦?請參考「Office 檔案開不了怎麼辦?
  5. 郵件容量超出 50MB 時,為了節省網站營運成本,僅提供下列會員使用:
    • 贊助會員 mvp ─── 贊助網站營運基金之會員(一天一元)詳細內容
    • 分享會員 vip ─── 長期且持續分享,半年內超過 100 篇以上者 詳細內容
m 良羽  Ex MVP icon Gatekeeper icon  於 2006-09-26 22:20:44 說
i `ve received plenty of this kind of e-mail ,but never been phished yet.
m point  Key icon Gatekeeper icon  於 2006-09-30 11:25:33 說
must be careful.
m andante= 應無所住_而生其心 =  於 2006-12-28 16:54:03 說
Surf safely with "Opera".
Fraud Protection (詐騙保護措施) 中文說明在
http://help.opera.com/Windows/9.10/zh-tw/index.html
手動
登入

 
 
快速
登入
使用 Facebook 帳號登入
查詢
密碼
 

  • 2013 網站改版公告
  •  
  • 歡迎lon1329加入!
  • 歡迎Judy Rila加入!
  • 歡迎TC加入!
  • 歡迎太陽餅加入!
  • 歡迎Mzzzz加入!
  • 歡迎anthony899841加入!
  • 歡迎jbtu加入!
  • 歡迎安安加入!
  • 歡迎柯國斌加入!
  • 歡迎Walis Nokan加入!
  • 歡迎Rachel Green加入!
  • 歡迎James Doe加入!
  • 歡迎James Vergara加入!
  • 歡迎Sofia Vergara加入!
  • 歡迎Cindy Cheng加入!
  • 歡迎鄭母菌加入!
  • 歡迎Jin Chen加入!
  • 歡迎Wei Zihan加入!
  • 歡迎林依依加入!

    ▲回到頁首▲