The Most Common Method Used Today for Phishing

1196 Words3 Pages

Phishing can be done in many ways. Phishers have technically high standards and they use innovative techniques for phishing. They will misuse the innovations in the technologies for illegal purposes, so they will invest more in technologies to gain benefits. It has become difficult for phishers to attack the organizations using the old methodology because the organizations are using various security measures and many financial institutions and organizations have increased their online presence. So the phishers introduced some more new techniques to gain access to the confidential data. Different types of phishing attacks are discussed below.(Jakobsson, Phishing and Countermeasures, 2006)
Deceptive Phishing:
The most common method used today for phishing is sending a deceptive email message. These mails include some false bait messages which demand the victim to click on a link which redirects to a website where we need to fill some information. These mails contain subject lines as if they come from a genuine organization for example, the subject line may be “Important message for all PayPal users”, etc. Some forms of bait messages which are displayed on the mails to lure the victims are
• Verify your account.
• There is some system failure so users have to re-enter their details.
• Your account is at risk as your information is not sufficient.
• Some messages would claim that there is a new service available to enroll in that service you need to do the following things.
(Jakobsson, Phishing and Countermeasures, 2006)
All these mails commonly contain a false link that is to be followed in order to resolve the problem and the recipients who thinks that this message is from genuine organization will click the link and lose their inf...

... middle of paper ...

...hterms.com: http://www.techterms.com/definition/phishing
Phishing Attacks. (n.d.). Retrieved from Scribd: http://www.scribd.com/doc/50680761/14/Deceptive-Phishing
Phishing email methods. (n.d.). Retrieved from Fraud Watch International: http://www.fraudwatchinternational.com/phishing-fraud/phishing-email-methods/
Phishing Explanation and Examples. (n.d.). Retrieved from utdallas.edu: http://www.utdallas.edu/infosecurity/Phishing.html
Recent Phishing. (n.d.). Retrieved from wikipedia: http://en.wikipedia.org/wiki/Phishing
Rekouche, K. (2011). Early Phishing. Retrieved from http://pushstart.info/: http://pushstart.info/earlyphishing.pdf
Tally, G. (2004, September). Anti-Phishing:Best Practices for Institutions and Consumers. Retrieved from antiphishing: http://www.antiphishing.org/sponsors_technical_papers/Anti-Phishing_Best_Practices_for_Institutions_Consumer0904.pdf

Open Document