Phishing Scams

Only available on StudyMode
  • Topic: E-mail, Phishing, Spyware
  • Pages : 8 (3014 words )
  • Download(s) : 99
  • Published : October 13, 2012
Open Document
Text Preview
Phishing Scams

The electronic world is embracing consumers and criminals. According to Report on Phishing by Binational Working Group on Cross-Border Mass Marketing Fraud, when internet users receive emails from trusted web sites such as famous financial institution, these emails redirect internet users to phony web sites that appear similarly to famous banks web sites. In addition, many customers are receiving phone calls from person who claims that he is working with famous financial institution asking them to provide him with their personal information; in fact this person has no relation to any organization. His purpose is to obtain specific key information that helping him to access people bank accounts or to enter inside their personal computers. What is phishing scams? The word phishing is a terminology that is created by internet criminals of emails and websites. It looks like it is coming from trusted organization, financial institution or government agencies in purpose to obtain internet users information. Internet scammers are trying to swindle their victims by obtaining their financial information or other information such a passwords and users names. Moreover, internet scammers are using different ways to gather information from their victims by downloading computer code in their victims’ computers that can provide the criminals to access the target computers to gain sensitive information (4). What is the scope of phishing scams in the United States of America? There are no specific statistics on the number of people who have been fraud through phishing scams, or total of the loss in dollar. There are indications that phishing scams are increasing rapidly over the last two years and has become an important issue in North America and the world (5). How phishing scams is committed? Internet criminals who want to gather information from their victims needs to create phony web site of real institution, and professional emails that convince their receivers it is from legitimate site such as government agencies or financial institutions. These web sites and emails must hold logos and slogans of famous companies. Hypertext Markup Language makes it easy to copy this logos and slogans by internet scammers. This method of copying logos and slogans is one of the reasons that led to increase numbers of phishing scams in general, then sending spoof emails to internet users asking them to update their information otherwise their accounts will be closed (7). Phishing scams must be controlled because it is pose electronic danger to internet users for many reasons. Phishing scams must be controlled because most people are using online banking. Phishing scams threaten the public trust in the internet, and that will lead to make internet users uncertain about the security of the business web sites and that will result to loss billions of dollars in the ecommerce environment. The opponent says internet is secure environment to do online transactions because of anti fraud software’s. According to Report on Phishing by Binational Working Group on Cross-Border Mass Marketing Fraud, “Depending on the type of fraud that a criminal commits with the aid of stolen identifying data, consumers and businesses may lose anywhere from a few hundred dollars to tens of thousands of dollars” (10). This is evidence that the internet is not secured enough to do secure online transactions because of identity theft. When the scammers obtain information from their victims anti frauds software can not do anything to stop the theft because scammers can defraud on the anti-fraud software’s. Online banking businesses are facing real threatens which is identity theft. A new version phishing scams has been used in criminal activity. According to Jason Milletary which is from the Cert Coordination Center at Carnegie Mellon University: Over the past two years, there has been an emergence of malware being used...
tracking img