Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

A Three Step Plan to Confront Phishing

Killing Phish.

  • See also the continually updated reports on phishing and pharming available from The Anti-Phishing Working Group and the definitions from their site as follows:
    Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. Pharming uses the same kind of spoofed sites, but uses malware/spyware to redirect users from real websites to the fraudulent sites (typically DNS hijacking). By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince recipients to respond to them.”
  • Sorry, comments are closed for this post.