Phishing and Pharming: Dangerous ScamsAs soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared. Pharming. Does it differ from phishing -- if yes, how? Pharming If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is very interesting matter, this article isn't about it. As for PC users, the term "pharming" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference. Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers. Dangerous Scams A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website. Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email? Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones. Phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information. This technique is aimed at stealing personal information. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively. Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability. However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget: • Never follow a link in an email, if it claims to be from a financial institution • Never open an attachment if the email is from somebody you don't know • Protect your PC from malware • Stay on the alert
More Identity Theft- you should know Articles10 Ways To Protect Yourself From Online Identity Theft Identity theft is becoming a bigger problem as more and more ...read more Asian Countries Worried About Identity Theft For many people in Singapore and other Asian countries, theft of their identities is ... read more Don't Get Caught by a Phishing Scheme You receive an email from your bank warning you that your account information ... read more Everything That You Need To Know About Online Identity Theft There is much that you need to know about online ... read more Fight Back Against Identity Theft Identity theft is a serious crime that costs American consumers billions of dollars and countless ... read more How To Avoid Getting Into Identity Theft Trouble The credit card industry seems to be growing at an unprecedented rate. ... read more How To Avoid Phishing Scams In today’s world the Internet is becoming as common as sliced bread. Most people use ... read more How to Check Your Credit Report for Evidence of Identity Theft Imagine finding the home of your dreams. It's the ... read more How to Protect Your Children's Identities When we think of identity theft, children are probably not the first victims we ... read more How To Protect Your Identity Online Surfing the Internet is a daily occurrence for an increasing number of people these ... read more |
|
Disclosure: Advertisements are placed on this website to offset the cost of maintenance and to keep this site free for everyone to use. Owners of this website will receive compensation for products and services purchased through featured advertisements. All claims of actual user results should be considered atypical best case scenarios and not in the norm. |