180 likes | 340 Views
DO YOU LOVE FISHING. OR. “PHISHING” ?. WHAT IS PHISHING? . HOW DOES PHISHING HAPPEN?. SCENARIO 1. HOW DOES PHISHING HAPPEN?. YOU HAVE BEEN PHISHED! THANK YOU FOR YOUR GENEROSITY…. SCENARIO 2. HOW TO DETECT SUSPICIOUS WEB SITES???. EXAMPLES. ~ TYPES OF PHISHING ~. PHARMING:
E N D
DO YOU LOVE FISHING OR “PHISHING”?
HOW DOES PHISHING HAPPEN? SCENARIO 1
HOW DOES PHISHING HAPPEN? YOU HAVE BEEN PHISHED! THANK YOU FOR YOUR GENEROSITY… SCENARIO 2
~ TYPES OF PHISHING ~ PHARMING: Through Spoofed Websites / Emails SMISHING: Through Short Messaging Service (SMS) VISHING: Through Voice IP (Phone calls)
HOW TO PREVENT FROM BEING “PHISHED”? 1. Be cautious with spams received through emails. ~ Especially from unrecognized senders ~ Asking for personal information ~ Stating sense of urgency to respond; threatening possible consequences if do not act immediately ~ Requesting you to click on a link, download files or open attachments 2. Protect your computer with firewall, spam filters, antivirus, and anti-spyware softwares. ~ Install the latest softwares and constantly update them 3. Regularly check your bank account, credit and debit card statements ~ Keep track of your transactions ~ Easy to detect irregularities
HOW TO PREVENT FROM BEING “PHISHED”? 4. Give personal information only through secured websites. ~ ‘Lock’ icon on the browser bar ~ ‘https’ URL instead of ‘http’ ~ Fully type URL address of website by yourself instead of using search 5. Contact the related company or bank to enquire if in doubt. ~ Regarding any emails, sms, phone calls received asking for personalinformation
Example of phishing cases • Maybank2u.com became victim to phishing culprits in 2008. • Notification sent through the fake Maybank website and emails sent to victims.
Lures victims to the fake internet banking site from the link given in the email and notification notice. • Unsuspecting victims enter their personal information to login.
2. Apple was attacked by phishers in 2011. • Customers receive emails purportedly from Apple. • Aimed at tricking customers to reveal their AppleID Billing Information. • Well-crafted scam with unusually well written and grammatically correct sentences with an authentic looking website.
REFERENCES • Morgan Stanley and Smith Barney, http://www.smithbarney.com/security_emailfraud.html • Bloggers.com, Tech Guide, http://techno-guideforall.blogspot.com/2011/06/how-to-protect-yourself-from-phishing.html • Visa, http://www.visa.ca/en/personal/pdfs/brand_spoofing.pdf • Identity Theft Killer, Prevent Identity Theft in 5 Minutes, http://www.identitytheftkiller.com/prevent-phishing-scams.php • infosec ISLAND, 10 ways to prevent phishing, Wednesday, May 19, 2010 http://www.infosecisland.com/blogview/4070-10-Ways-To-Prevent-Phishing.html • PHISHING.ORG, How to prevent phishing scams, http://www.phishing.org/scams/prevent-phishing/ • Maybank Phishing Scam E-mails in Malaysia, http://www.shaolintiger.com/2009/03/23/maybank-phishing-scam-e-mails-in-malaysia/ • TG Daily, Massive phishing scam targets Apple users, Emma Woollacott, http://www.tgdaily.com/security-features/60451-massive-phishing-scam-targets-apple-users • New phishing scam targets Apple users , George Wong , http://www.ubergizmo.com/2011/12/new-phishing-scam-targets-apple-users/ • Saturday Party, Walter and Simon, Dance mood by Nitro Album. • Google images
Together as 1 Malaysia, let us unite as one to curb phishing!