Phishing Scams

Topics: Identity theft, Fraud, Phishing Pages: 9 (2858 words) Published: June 22, 2013
The social relevance of phishing scams in a global era: From present to future

TABLE OF CONTENT
TABLE OF CONTENT2
ABSTRACT3
INTRODUCTION4
Six common ways about phishing scams5
POTENTIAL SOCIAL IMPACTS6
IMPACT ON PEOPLE7
CONCLUSION8
REFERENCE LIST9

ABSTRACT
Because of the development of technology, people are using email more and more often than before to purchasing, online-banking. etc. There are lots of emails are used actively in users communication, users must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.S. Bank Corporation those users received contains the subject "U.S. Bank Fraud Verification Process" and in the body of the mail says "We recently reviewed your account, and suspect that your U.S. Bank Internet Banking account may have been accessed by an unauthorized third party. Protecting the security of your account and of the U.S. Bank network is our primary concern. Therefore, as a preventative measure, we have temporarily limited access to sensitive account features. To restore your account access, please take the following steps to ensure that your account has not been compromised." It continues with a link to a webpage, which looks very similar to original web page of the bank. This misleading web site which always contains malicious program appears authentic with familiar graphics and logos. The wordings are professional right down to the legal disclaimer at the bottom of the page. If users holding an account of this bank by coincident, following the steps of the email and input customers' account, pin, password, etc. Then these users just have handed over access to their own account to a con artist, in a matter of days, will drain off all the money available in that account. This new scam, which is increasing in a very significant pace, is called "Phishing Scams". Phishing is one of the Identity Theft form, where these con artists use official looking email contains a link about some phony web pages capable of collecting information, tricks an unsuspecting victim into divulging sensitive personal data. Scammers will used up these victims' savings by the personal data which they tricked from the emails. However, recently, every major bank has been hit with this scam. Cheaters send out huge amounts of emails with an expectation that some of these email address owners may have online access to their accounts at the bank. The term "Phishing" is a deviation of the word "Fishing". In hackers' lexicon, in many words, "F" becomes "Ph". The term derives from the fact that scammers use bait as they "fish" for users' personal information.

INTRODUCTION
One of the greatest ironies of the 20th century is that although many technologies were intended to enhance our well-being, they have undermined our life over time. However, everything has pros and cons. This article will illustrate on the negative effects on phishing scams about what are kinds of potential social impacts will phishing scams have and phishing scams could bring people what kinds of impacts.

Figure 1: How phishing works by e-mail

The term "phishing" comes from the way in which scammers "phish" for consumers' personal information and financial data. Phishers contact consumers, pretending to be a legal organization, for instance, financial institutions, online retailers or government agents to trick victims in order to get their personal information, such as Social Security numbers, financial account numbers, PIN numbers, or passwords. Once the fraudster succeeded, they will use the information to make illegal acts, such as purchasing, opening new accounts with the consumer's name, transfer all the money or commit other crimes.

"The most common phishing scams is through fraudulent e-mails that mimic the language and graphics of well-known financial institution and retailers." (Barbara, 2004) For example, the phishing attacker uses e-mails and...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Phishing
  • Investigation Procedures for Email phishing Essay
  • Essay about Preventing Phishing and Identity Theft at Client Side
  • Phishing and Free Ring Tines Essay
  • Phishing Attack Essay
  • satyam scam Essay
  • Scam Essay
  • Essay about Scam

Become a StudyMode Member

Sign Up - It's Free