Preview

A Memorandum To Spear Phishing Attacks

Satisfactory Essays
Open Document
Open Document
621 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Memorandum To Spear Phishing Attacks
NOTICE
Dear Customers,
Phishing
The term phishing created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Started by cybercriminals, as it is easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses. Phishing attacks are the most common security challenges that both individuals and companies face in keeping their information secure. The attacks can get access through passwords, emails, and credit card details (and sometimes, indirectly, money).
Businesses, of course, are a particularly worthwhile target. However, the attackers also know that one successful attempt against a person of great wealth can be of great profit, and spear phishing was born. Spear phishing attempts are not typically originated by “random hackers” but are more likely to be led by committers out for financial gain or trade secrets.
…show more content…
Any information that they had on you can be used to access financial accounts to rack up significant debt in your name. The attackers might hide behind your name in a legal matter, leaving you with a false criminal record.
A way to protect yourself from identity theft may include password-protecting your devices and an anti-virus software, using caution when sharing personal information or account numbers, and by clearing all personal information off of technology

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    "Identity theft is the unauthorized use or attempted use of an existing credit or debit card, bank account, telephone account, online account, or insurance account; the unauthorized use or attempted use of another person’s information to open such an account, secure a loan, or commit another crime; or the misuse of another person’s information for a fraudulent purpose" (Conklin, 2013, p. 58). The techniques performed by offenders to achieve identity theft can be very strategic, focusing on naiveness of focal groups. One example is where offenders impersonate government officials and ask for personal information with threats of losing benefits by not submitting. Due to this, the most appropriate theory that applies is rational choice theory.…

    • 258 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    3. What are some of the ways to reduce your risk of becoming a victim of identity theft?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    "Identity Theft: Protect Yourself." Techniques: Connecting Education & Careers 82 (2007): 60. MasterFILE Premier. EBSCO. Mesa Community College, Mesa. 21 Sept. 2013. Keyword: identity theft. This article is a nice prevention article on how to protect yourself from identity theft. This will be a great help when writing about what the government can do to help protect people from identity theft because I can get an idea on what is already out there to help protect people.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    “Phishing” is when cybercriminals try to get personal information like credit card numbers to steal money and passwords to important accounts. They can get this information from you and your computer. They can do it through emails, text messages, phone calls even. There are many techniques and styles attackers use to get this information out of people.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Phishing is a computer criminal activity that uses a special engineering as a disguise on a website in order to acquire credit card information, social security, and other important information about the user. The first use of phishing started as far back in the 1990s when AOL had to deal with the hackers signing on as employees requesting billing and other information from account users. AOL had to put out a disclaimer stating that employees of the company would not request such information from their customers.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Phishing Scams

    • 2858 Words
    • 12 Pages

    This new scam, which is increasing in a very significant pace, is called "Phishing Scams". Phishing is one of the Identity Theft form, where these con artists use official…

    • 2858 Words
    • 12 Pages
    Powerful Essays