Written By Sherly on Thursday, January 26, 2017 | 10:57:00 AM

What are Phishing, Pharming and Vishing?


Phishing, pharming, and vishing are three types of social engineering attacks geared towards both individual and business targets. Read on to find out more about all these threats, including the wrinkles that differentiate them from another.
Social engineering attacks, namely phishing and pharming, trick users into revealing personal or financial information by using fraudulent email messages or websites. Fraudulent email messages having a genuine appearance are sent out to capture personal data, including financial details.
Pharming resembles phishing. In this attack, hackers reroute browsers to a identical bogus site to steal the identity and commit fraud. This could be performed using DNS cache poisoning, where an opponent creates fake entries over a DNS server to redirect traffic. Here the attacker hides the specific URL having a legitimate looking address or similarly spelled URL. It is important to check perhaps the site has a secure certificate from your legitimate owner.
Pharming attacks are mostly targeted at online banking and shopping customers. Entering the valid browser address and double checking the spelling are crucial methods to protect yourself from pharming attacks.





var ezzns22 = 0.90:504560,1.00:504647,1.50:504652,0.30:504551,1.60:504653,2.00:504657,2.80:504661,0.50:504556,1.10:504648,1.30:504650,2.60:504660,3.00:504664,5.00:504669,0.15:504144,0.40:504554,0.60:504557,1.80:504655,1.90:504656,0.45:504555,0.70:504558,2.20:504658,3.50:504665,0.20:504145,0.80:504559,1.40:504651,2.40:504659,0.05:504099,0.10:504141,0.25:504548,1.70:504654,4.00:504666,4.50:504667,0.35:504552,1.20:504649,;


var ezoflbf_2_22 = function() IL11ILILIIlLLLILILLLLIILLLIIL11111LLILiiLIliLlILlLiiLLIiILL.ReloadFromP(1022);;
var ezoflbf_22 = function() eval(ez_write_tag([[300,250],'brighthub_com-medrectangle-2','ezslot_1']));
;
Criteo.DisplayAd(
zoneid: 504559, containerid: 'crt-22', passbackcode: ezoflbf_22
);
setTimeout(function()if(typeof IL11ILILIIlLLLILILLLLIILLLIIL11111LLILiiLIliLlILlLiiLLIiILL == 'object')
var ezflaun = IL11ILILIIlLLLILILLLLIILLLIIL11111LLILiiLIliLlILlLiiLLIiILL.GetNameFromPositionId(1022);
if(typeof ezflaun != 'undefined' && ezflaun.length > 0)
if(typeof ez_ad_units != undefined)
for(i=0;i
if(ezflaun.indexOf(ez_ad_units[i][1]) >= 0)
return false;



IL11ILILIIlLLLILILLLLIILLLIIL11111LLILiiLIliLlILlLiiLLIiILL.StoreStatSource(ezflaun, 47, 0.80);
IL11ILILIIlLLLILILLLLIILLLIIL11111LLILiiLIliLlILlLiiLLIiILL.RemoveSlotById(ezflaun);


, 4000);Vishing, or voice phishing, is an attack directed at VoIP phone services that tricks people into revealing personal data. In this attack, individuals use fraudulent emails or automated phone messages to request that consumers call a fake automated service center or toll-free number. If the fraud is not recognized and private information is disclosed, then your "visher" has gained another victim. The main method to protect yourself out of this threat is to apply caution and be careful with what information you allow out over the telephone.




eval(ez_write_tag([[580,400],'brighthub_com-netboard-1','ezslot_2']));


Pharming attacks can be tough to acknowledge. To overcome issues like DNS cache poisoning, a safe and secure version of DNS Domain Name System Security Extensions (DNSSEC) could possibly be implemented.
Implementation of merchandise like Symantec Multi-tier Protection could, to a certain degree, stop malware including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. Also the usage of proxy servers using Microsoft ISA server and Websense could protect users from phishing attacks. Proxy servers improve security by filtering site content and malicious software.
Websense Web Security Suite provides protection against spyware, malicious mobile code, and phishing attacks, bots, as well as other Web based threats. The Websense ThreatSeeker feature proactively discovers Web security threats by scanning 600 million Web sites weekly. This product also identifies malicious Web sites, protocols, applications, and HTTP traffic and blocks the access on the Internet gateway.
A first level defense against phishing is always to secure computers using antivirus applications, group policies, Windows security templates, service packs and security patches, spyware prevention tools etc. Implementation of IDS and honeypots can significantly increase defense from the phishing attacks.
Phishing filter features positioned on Internet Explorer assistance to detect phishing websites. A filter performs three steps to distinguish and protect phishing scams. As soon as the website address is entered; the legitimacy will be compared having a listing of legitimate sites reported to Microsoft that is certainly stored locally in the computer. The next step is always to analyze sites with common characteristics of an phishing website. In the last step, with the user's consent, the filter sends website addresses to Microsoft to further check against reported phishing websites. If that particular site actually is inside the list of reported phishing websites, IE will display a reminder. When the Phishing filter sends the address of your site to Microsoft, it captures the user's IP address, browser type, and the Phishing filter version.
Internet Explorer 7 offers an extra layer of protection if you visit sites who use Extended Validation (EV) SSL Certificates. The address bar turns green and displays more info, like the identity with the Web site owner.(Microsoft, 2006)
Most e-mail programs feature built-in anti-phishing detection, which automatically deletes the e-mail message or moves it towards the junk folder with respect to the (Spam Control Level) SCL.
References:








http://seo-shortcut.blogspot.com

G+

Anda baru saja membaca artikel tentang What are Phishing, Pharming and Vishing?. Jika Anda menyukai Artikel di blog ini, Silahkan masukan email anda dibawah ini untuk berlangganan gratis via email, dengan begitu Anda akan mendapat kiriman artikel terbaru dari SEO-Shortcut
feedburner

0 comments:

Post a Comment

SEO-Shortcut © 2015. All Rights Reserved.
Thanks SEOCIPS, Powered By Blogger