ALL >> Computers >> View Article
Protecting Your Online Security-phishing

Computer Phishing involves attempts to fraudulently acquire personal information on a particular website usually made accessible through e-mails. These may include passwords, usernames, as well as credit card and bank account details.
There are three types of Phishing techniques used online. The first one is called 'Link manipulation'. Through this method phishers use a form of technical deception where a link in an e-mail appears to belong to a genuine website, but in truth the website is a fake representation of the link. These links are made deceivable as phishers use misspelled URLs or sub domains.
The second type of Phishing is called filter evasion. Filter evasion involves the use of images instead of text to redirect users to a website. This type of Phishing is harder to detect for anti-phishing filters because these filters are normally programmed to detect text commonly used in phishing e-mails.
Website forgery is the third type of online phishing. This process occurs when the user visits or is redirected to a website. Once there, the contents of the address bar are modified to a new URL which ...
... is a spoof link. This is done by either placing a picture over the URL or by replacing the original address bar with a new one containing a legitimate URL.
Once these phishers manage to obtain the user's personal information such as credit card details or social security numbers, they can create fake accounts under the user's name, thus ruining their credit or deny them access to their own accounts.
The most common way of combating phishing is by eliminating phishing e-mails. This is done by specialized spam filters where they rely on machine learning and natural learning processes to classify phishing e-mails.
Another way is to install anti-phishing features as extensions or toolbars for web browsers. These add-ins will then monitor websites and warn you when a spoof website is detected. The best way to combat phishing is if the user is able to recognize phishing websites and e-mails. If you receive an e-mail saying that an account needs to be verified, always try verifying the e-mail, because most are spoof e-mails. Phishing is becoming an extremely popular way of online fraud because of the modern browsing habits of users, surfing the web freely without caution. It is important that you keep track of your own online activities to combat this problem.
Add Comment
Computers Articles
1. What Is Power Bi: Your Questions Are Answered By A Bi ConsultantAuthor: goodcoders
2. Unlocking The Power Of Digital Marketing In Bangalore: Why Choose A Leading Digital Marketing Agency
Author: Cubikeymedia
3. Top 5 Innovation Management Software Of 2025
Author: Ben Gross
4. Top 5 Mlops Tools Of 2025
Author: Ben Gross
5. Top Cybersecurity Trend 2025 | Vapt & Soc Services In India
Author: Reinfosec
6. Best Alternative Dating Apps Like Tinder
Author: goodcoders
7. Best 9 Programming Languages For Blockchain App Development
Author: goodcoders
8. The Significance Of Early Exposure To Ai And Robotics For Kids
Author: stem-xpert
9. Top 5 Cloud Analytics Platforms Of 2025
Author: Ben Gross
10. Top 5 Network Monitoring Systems Of 2025
Author: Ben Gross
11. Revolutionise Your Training Management With Xsosys Technology
Author: Xsosys Technology(S) Pte. Ltd.
12. Rugtek Printers: Your Complete Guide To Selecting The Perfect Model
Author: srikanth
13. Rsgoldfast Runescape Gold:fishing
Author: RuneScape gold
14. Understanding Mobile Intranet Workflow
Author: goodcoders
15. How To Personalize Your Mobile Ux?
Author: goodcoders