![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Phishing and Pharming: Dangerous Scams
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how? Two Pharmings Actually, two completely different fields use the term "pharming" now. We can say there exist two separate "pharmings". If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is a very interesting matter, this article is not about it. As for PC users, the term "phishing" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference. Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers. Dangerous Scams A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website. Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email?Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones. Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information. It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively. Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability. However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget the advice which they all are likely to have learned by heart:
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables information-stealing programs.Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: The Security Risks of Forking The New Stack IDF to close off road in Israel's South, activate security systems The Jerusalem Post D.C. police cite 'lax security' in closing lounge after shooting The Washington Post Apartment security guard accused of firing shots at man’s car WREG NewsChannel 3 Ransomed.vc group claims hack on 'all of Sony systems' Cyber Security Connect Has Sony been hacked again? Help Net Security A ransomware group claims to have breached 'all Sony systems' | VGC Video Games Chronicle DNS security poses problems for enterprise IT Network World Notice of Funding Availability: Food Security Mini-Grants Advisory Groups & Commissions Six Steps Toward AI Security Nvidia New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State Are We Really Helping? U.S. Security Assistance to Partner Nations ... Government Accountability Office Ultimate Guide to IoT Security Testing Security Boulevard Border Security is National Security - Kansas Common Sense - U.S. ... Senator Jerry Moran Salinas looks to private security to patrol popular park KSBW Monterey Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... Customs and Border Protection Security issues hit Pakistan’s ICC Cricket World Cup warm-up match in India Al Jazeera English Pennsylvania woman caught with loaded gun at Pittsburgh ... - Transportation Security Administration Pennsylvania woman caught with loaded gun at Pittsburgh ... Transportation Security Administration Security Think Tank: Three ways to identify the best encryption use ... ComputerWeekly.com Biden-Harris Administration Announces Final National Security ... US Department of Commerce Enhanced Security Automation: Lexington Police Urges Integration ... Robotics and Automation News Director General Grossi: IAEA is Instrument for Peace, Security and ... International Atomic Energy Agency Georgia election officials respond to lawmakers' security demands - The Atlanta Journal Constitution Georgia election officials respond to lawmakers' security demands The Atlanta Journal Constitution Biden Administration Announces Additional Security Assistance for ... Department of Defense The Intersection of network security and Wi-Fi The Register Crypto Quantique introduces SaaS platform QuarkLink Ignite Help Net Security China produces world record peanut test crop amid national food security push South China Morning Post Update on Naked Security Sophos Shift5: Harnessing Raw Data for Enhanced Aircraft Security Avionics International US, Kenya Sign Defense Agreement Ahead of Haiti Security Mission Voice of America - VOA News Winston-Salem bar owner speaks out after security guard ‘brutally attacked,’ police say WGHP FOX8 Greensboro Building Your Incident Response Team Security Boulevard Abilene Pride Festival canceled due to security concerns, vendors come together with ‘Rainbow Market’ KTAB - BigCountryHomepage.com IND airport security detected most-ever firearms in 2023 FOX 59 Indianapolis Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security Security exercise scheduled Wednesday and Thursday Peninsula Daily News Cisco+ Secure Connect SASE Review & Features 2023 eSecurity Planet Security Beat: Tame Start to the Fall Semester — MARIST CIRCLE Marist College The Circle MLB Insider Provides Update on Buck Showalter's Job Security Sports Illustrated Statement by President Charles Michel at the UN Security Council ... Présidence française du Conseil de l'Union européenne 2022 |
![]() |
![]() |
![]() |
RELATED ARTICLES
Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. HackAttack P C. owners are constantly at risk from attacks by hackers. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Is Adware - Spyware Putting Your Privacy at Risk Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. ![]() |
home | site map |
© 2006 |