1. Hacking & Phishing 2. What is hacking? 3. How hackers discover your PC’s address? 4. How does a firewall work? 5. What is Phishing? 5.1 Introduction 5.2 Types of Phishing 5.2.1 Clone Phishing 5.2.2 Spear Phishing 5.2.3 Phone Phishing
1. Hacking & Phishing
No, we're not talking about baiting the hook while you have a bad cold. Hacking and Phishing are two very different types of computer security threats. Hacking is an extremely y high tech attack which requires you to take certain precautions to protect your computer and al l of the data which is stored in it. Phishing, on the other hand, i s decidedly low tech and just requires a dose of common sense to ward off the ...view middle of the document...
How to protect yourself against hackers the best method is to use what i s known as a "firewall ". This is a piece of hardware, or software, or both which is designed to make your computer "invisible" on the Internet.
4. How does a firewall work?
A firewall works by blocking the "ports", or doors, which hackers commonly use to gain entrance. Once those ports are blocked the hacker can no longer "see" your computer and, thus, is unable to attack it. The new version of Windows XP comes with a built-in firewall program which may be al l that you need to keep your computer safe. Some cable modem and DSL providers al so configure your Internet modem to act as a firewall . In addition there are commercial firewalls available which run from simple to very sophisticated.
5. What is Phishing?
Phishing is a term that's applied to the l attest identify theft scam where potential thieves and con men use fake e-mail messages, which look very real sometimes, to con you into giving up credit card, bank and other sensitive financial and personal information. Once you give it up they proceed to clean you out and/or steal your identity and run up thousands of dollars worth of debt in your name. Al though some phishing excursions take pl ace over the telephone, where people cal l up and pretend to be someone that they are not, most of the attacks come in the way of e-mail messages. These messages look very official and purport to come form your bank, charge card company, brokerage house and even government agencies. These con men go to the website of the company or agency that they are impersonating, steal the graphics and logos and then proceed to put together an email which looks like it actually came from a valid source. The email may say that your account is about to be suspended unless you "verify" your personal information, or they may contain some other important or urgent-sounding request. What they al l have in common is that they require you to click on a link that's embedded in the email and then fill
out some form that asks for your PIN code, credit card number, bank account number, social security or tax ID and anything el se that they think that they can get away with asking you. Once they have that information - you're toast.
Phishing is a form of social engineering in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users' condential or sensitive credentials by mimicking electronic communications from a trustworthy or public...