[vip_students] Web Notes: What is a Phishing attack?

  • From: "Paul Traynor" <paul.traynor@xxxxxxx>
  • To: <vip_students@xxxxxxxxxxxxx>
  • Date: Mon, 27 Aug 2007 09:27:41 +0100

Phishing attacks are on the rise, so having protection from them is a great
addition to IE7. A 

phishing attack is one where someone sends an e-mail claiming to be a
reputable organization such as a bank. The e-mail can look quite legitimate,
so many people are fooled into clicking the link. 

When they get to the website, they see a display that looks very much like
the reputable organization's website. In fact, sometimes they look exactly
alike. The whole purpose of this ruse is to obtain personal information from
the user including social security number, date of birth, and mother's
maiden name. The person who was phishing can now open a credit card in the
user's name. As you can see, having good protection from this kind of attack
is a must because a phishing attack can take any form. For example, someone
might do the very same thing to gain access to your corporate network. 
Internet explorer 7 which some of you will have offers protection against
such attacks as do spam blockers such as cloudmark or spamfighter.

Regards,

Paul.


********************************************************************

NOTICE: The information contained in this email and any attachments 
is confidential and may be privileged.  If you are not the intended 
recipient you should not use, disclose, distribute or copy any of 
the content of it or of any attachment; you are requested to notify 
the sender immediately of your receipt of the email and then to 
delete it and any attachments from your system.

NCBI endeavours to ensure that emails and any attachments generated 
by its staff are free from viruses or other contaminants.  However, 
it cannot accept any responsibility for any such which are 
transmitted.  We therefore recommend you scan all attachments.

Please note that the statements and views expressed in this email 
and any attachments are those of the author and do not necessarily 
represent the views of NCBI


********************************************************************




Other related posts: