internet phishing

17
Internet Phishing Not the kind of Fishing you are used to Realised by JRA Charaf Ecole Nationale des Sciences Appliquées – Safi 2012 – RefreshMyMind.Com

Upload: master-slave

Post on 12-Apr-2017

133 views

Category:

Internet


0 download

TRANSCRIPT

Internet PhishingNot the kind of Fishing you are used to

Realised by

JRA Charaf

Ecole Nationale des Sciences Appliquées – Safi

2012 – RefreshMyMind.Com

Plan:

What’s Phishing ?1

How to protect yourself ?2

Phishing procedure3

Phishing examples4

Phishing Definition

A criminal activity using social engineering techniques (a collection of techniques used to manipulate people into performing actions or divulging confidential information).

Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

Phishing

It often involves receiving an email from a trusted company, such as eBay, PayPal, the government or your bank.

This email may list unauthorized charges, shipments or bills

RefreshMyMind.Com

Phishing

Often phishers will use your name, address and phone number to make their correspondence appear legitimate. The attackers can get your information from the following sources:

Unfortunately, many companies will sell your private information.

Private data can be stolen by hackers

How To Protect Yourself ?

1

Contacting the company, for subject of the email

3

Verifying information in the email

2

Bypassing the link of the suspected phishing message

How To Protect Yourself ?

4

Using SPAM filters

6

Implementing some extensions to the browser

5

Implementing Anti-phishing measures to browsers

Phishing procedure

Step 1 Step 2 Step 3

Scams Mailing-Lists Phishing e-mails

Example of scams

Phishing Example

Example of scams

RefreshMyMind.Com

Mailing lists:

Phishing ExamplePhisher has used an image to make it harder for anti-phishing filters to detect by scanning for text commonly used in phishing emails.

Phishing Example

What do Moroccan phishers buy from internet?

Thank You for your AttentionStay Alert. Be

Safe.RefreshMyMind.Com