Page 26 - security threats new-1
P. 26
In addition, some government agencies and nonprofit organizations provide
similar assistance, typically with websites that have information and tools to help
people avoid, remedy, and report incidents of identity theft. Many of the best
5
credit monitoring services also provide identity protection tools and services.
**PHISHING**
• What is phishing?
Act of fooling a computer user into submitting personal information by
creating a counterfeit it website that looks like a real (and trusted) site.
• History Phishing
▪ 1980s -A phishing technique was described in detail in a paper and
presentation delivered to the 1987 International HP Users Group,
Interex.
▪ 1990s -The term "phishing" is said to have been coined by the well
known spammer and hacker in the mid-90s, Khan C. Smith.The first
recorded mention of the term is found in the hacking
▪ 2000s -The first known direct attempt against a payment system
affected E-gold in June 2001, which was followed up by a "post-9/11
id check" shortly after the September 11 attacks on the World Trade
Center
The first known phishing attack against a retail bank was reported
by The Banker in September 2003
• Why is it called phishing?