How Phishing Works


Anti-Phishing
Anti-phishing methods include the use of firewalls and anti-virus software.
Anti-phishing methods include the use of firewalls and anti-virus software.
HowStuffWorks.com

The steps you normally take to protect your computer, like using a firewall and anti-virus software, can help protect you from phishing. You can review Web sites' SSL certificates and your own bankand credit card statements for an extra measure of safety.

In addition, phishers tend to leave some telltale signs in their e-mail messages and Web pages. When you read your e-mail, you should be on the lookout for:

  1. Generic greetings, like "Dear Customer." If your bank sends you an official correspondence, it should have your full name on it. (Some phishers have moved on to spear phishing, which can include personalized information.)
  2. Threats to your account and requests for immediate action, such as "Please reply within five business days or we will cancel your account." Most companies want you as a customer and are not likely to be so quick to lose your business.
  3. Requests for personal information. Most businesses didn't ask for personal information by phone or through e-mail even before phishing became a widespread practice.
  4. Suspicious links. Links that are longer than normal, contain the @ symbol or are misspelled could be signs of phishing. It's safer to type the business's URL into your browser than to click on any link sent in e-mail.
  5. Misspellings and poor grammar.

Fortunately, businesses and governments are fighting phishing. The United States government has instructed banks to start using two methods of security that include both passwords and physical objects, like tokens or biometric scanners, for online transactions by the end of 2006 [Source: Wired]. Many Internet service providers (ISP) and software developers offer phishing toolbars that verify security certificates, tell you the location where the site you visit is registered and analyze links. They also provide tools for reporting phishing attempts. Other programs use visual cues to confirm that you've reached a legitimate site.

­Responding to Phishing­

If you get an e-mail that you believe is a phishing attempt, you should not reply to it, click on the li­nks or provide your personal information. Instead, you should report the attempt to the business being spoofed. Use their Web site or phone number rather than following links in the suspect e-mail. You can also inform the National Fraud Information Center and the Anti-Phishing Working Group.

If you believe you may have given your personal information to a phisher, you should report the incident to:

You should also change your passwords for the site you believe was spoofed. If you use the same password at other sites, you should change your passwords there, too.

See the links below for more information about phishing and related topics.

Related Articles

More Great Links

Sources

  • Abad, Christopher. "The Economy of Phishing." First Monday. http://www.firstmonday.org/issues/issue10_9/abad/
  • "Alarming over 'Pharming' Attacks." ZD Net UK. http://reviews.zdnet.co.uk/software/internet/ 0,39024165,39188617,00.htm
  • BBB Online: Phishing http://www.bbbonline.org/idtheft/phishing.asp
  • Evolution of Phishing Attacks. http://www.antiphishing.org/Evolution%20of%20Phishing%20Attacks.pdf
  • FTC: How Not to Get Hooked by a Phishing Scam http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm
  • Grow, Brian. "Spear Phishers are Sneaking In." IBM. http://www-03.ibm.com/industries/financialservices/doc/ content/news/magazine/1348544103.html
  • Help Prevent Identity Theft from Phishing Scams. Microsoft. http://www.microsoft.com/athome/security/e-mail/phishing.mspx
  • IBM report: Government, financial services and manufacturing sectors top targets of security attacks in first half of 2005 http://www-03.ibm.com/industries/financialservices/doc/content/ news/pressrelease/1368585103.html
  • Kay, Russell. "Phishing." Computerworld. http://www.computerworld.com/securitytopics/security/story/ 0,10801,89096,00.html
  • Kerstein, Paul. "Talk Back." CS Online. http://www.csoonline.com/talkback/071905.html
  • "Know Your Enemy: Phishing." The Honeynet Project. http://www.honeynet.org/papers/phishing/
  • Microsoft Anti-Phishing Technologies http://www.microsoft.com/mscorp/safety/technologies/antiphishing/ default.mspx
  • Network World: Visual Cues may Stymie Phishers http://www.networkworld.com/columnists/2005/062705edit.html
  • Next Generation Security Software: The Phishing Guide http://www.ngssoftware.com/papers/NISR-WP-Phishing.pdf
  • "One in Four Identity-Theft Victims Never Recover." Information Week. http://www.informationweek.com/showArticle.jhtml?articleID=166402700
  • "Pharming Out-scams Phishing." Wired. http://www.wired.com/news/infostructure/0,1377,66853,00.html
  • Pharming.org http://www.pharming.org/index.jsp
  • "Phishing Activity Trends Report." AntiPhishing, August 2005. http://antiphishing.org/apwg_phishing_activity_report_august_05.pdf
  • Schneider, Bruce. "A Real Remedy for Phishers." Wired. http://www.wired.com/news/politics/0,1283,69076,00.html
  • Special Report on Phishing. U.S. Department of Justice. http://www.usdoj.gov/criminal/fraud/Phishing.pdf
  • "Tighten Web Security, Banks Told." Wired. http://www.wired.com/news/business/0,1367,69243,00.html
  • Windows IT Pro: Security Update: Phishing and Pharming http://www.windowsitpro.com/Article/ArticleID/46789/46789.html?Ad=1

More to Explore