Page 26 - security threats new-1
P. 26

In addition, some government agencies and nonprofit organizations provide
               similar assistance, typically with websites that have information and tools to help
               people avoid, remedy, and report incidents of identity theft.  Many of the best
                                                                                   5
               credit monitoring services also provide identity protection tools and services.





                                            **PHISHING**




                   •  What is phishing?


               Act of fooling a computer user into submitting personal information by
               creating a counterfeit it website that looks like a real (and trusted) site.


                   •  History Phishing


               ▪  1980s -A phishing technique was described in detail in a paper and

                   presentation delivered to the 1987 International HP Users Group,
                   Interex.


                ▪  1990s -The term "phishing" is said to have been coined by the well
                    known spammer and hacker in the mid-90s, Khan C. Smith.The first

                    recorded mention of the term is found in the hacking


               ▪  2000s -The first known direct attempt against a payment system
                   affected E-gold in June 2001, which was followed up by a "post-9/11

                   id check" shortly after the September 11 attacks on the World Trade

                   Center

               The first known phishing attack against a retail bank was reported

               by The Banker in September 2003


                   •  Why is it called phishing?
   21   22   23   24   25   26   27   28   29   30   31