DONT BE A PHISH BAIT
TABLE OF CONTENTS
1. Introduction ----------------------------------------------------- 1 2. What is Phishing ----------------------------------------------------- 2 3. Phishing History ----------------------------------------------------- 4 4. Types of Phishing --------------------------------------------------- 4 5. How to recgnize Phishing Scam -----------------------------------6 6. Phishing pages ------------------------------------------------------- 8 7. How to handle Phishing E mail ----------------------------------- 9 8. Phishing trends in year 2012 -------------------------------------- 11 9. Conclusion ----------------------------------------------------------- 12 10. References ----------------------------------------------------------- 13
INTRODUCTION
The Internet has brought an exciting global marketplace directly to our fingertips, allowing us to shop and invest at our convenience. Yet when you provide personal information and check out your "shopping cart" at an online store, can you be certain your purchase will be safe? Can someone steal your credit card number during a transaction? Can you confirm that you are doing business with a reputable Web site and not with a shady imposter?
Although millions of people do business over the Internet daily, it's still important that you take steps to protect yourself. The Internet is unique technology with characteristics that offer potential for certain types of fraud. As a result, scam artists are continually trying to create new schemes to take your money.
The Internet is essentially an open communications system, so it's important that private and confidential information, such as credit card numbers and personal financial data, remains private during e-commerce. The Internet is also relatively anonymous, so it's important that you confidently confirm a person or entity's identity before conducting