Friday, October 15, 2010

Phishing Without a Pole

Phishing involves attempting to acquire sensitive information such as usernames, passwords, and credit card details by pretending to be a trustworthy source. Communications purporting to be from popular social websites, auction sites, online payment processors or IT administrators commonly are used to lure the unsuspecting public. Phishing is typically carried out by E-Mail or instant messaging. E-mails with typos, misspellings, and poor grammar are indicators. This fraudulent activity often directs users to enter details at a fake website whose appearance almost is identical to the legitimate site. Don't fall for this bait and get caught!

No comments: