19.3 – Phishing & Countermeasure

19.3 – Phishing & Countermeasure
The best way to get another person’s login credentials is by asking them. Though it sounds impractical and obvious, it is the most extensively used technique to get sensitive information. Phishing has become the Internet’s equal of asking for login credentials, and computer users fall victims every year to phishing frauds. Phishing is a criminal act using social engineering methods. Phishers try to fraudulently obtain sensitive information, such as login credentials and credit card information, by hiding it as a trustworthy unit in an electronic communication. Phishing will look like a legal email from a legal company such as your…
To access this content, you must subscribe to this General Subscription, or log in if you are a member.

Share this post