Skip to Content
How Personal & Internet Security Work
book

How Personal & Internet Security Work

by Preston Gralla
May 2006
Beginner
288 pages
2h 32m
English
Que
Content preview from How Personal & Internet Security Work

Chapter 6. How “Phishing” Attacks Can Steal Your Identity—and How to Protect Against Them

How “Phishing” Attacks Can Steal Your Identity—and How to Protect Against Them

Perhaps the most lucrative type of Internet attacks are so-called phishing attacks—attacks in which you’re sent an email from what appears to be a bank; financial institution; or commerce site such as PayPal, Amazon, or eBay, but which is in fact forged. The term phishing was invented by hackers who were “fishing” to steal account information from AOL users. Hackers frequently replace the letter f with ph, and that’s how the term was created. The emails warn that you must log on to your account, perhaps to verifyinformation or perhaps to ensure your account ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Andy Walker
Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 0789735539Purchase book