Pharming, and the threat of identity theft
PHISH STORY
The pharmers and phishers are after your precious financial infor-mation. We’ll show you how to protect your interests.
Phishing is the art of tricking unsuspecting Internet users into giving up personal and financial information. This nefarious game has brought big rewards to a new generation of cyber con men. But phishing is only one of several tools in a bigger bag of tricks. This article examines some popular techniques for identity theft and shows what you can do to stay ahead of the threat. Phishing and Pharming Phishing uses tricks like spoofed email to tempt unsuspecting users into visiting rogue sites, where they are asked to enter personal data such as passwords or PIN numbers. Phishing attacks occur in two phases: in Phase One, the user is tricked into visiting the attacker’s web server. Attackers use various initial vectors to attract victims. In Phase Two, the user is prompted to enter the personal data. This part of the attack is often referred to as visual spoofing. The best known initial vectors are email spoofing and cross site scripting (XSS), where the attacker misuses the website of a trusted third party to initiate the attack. In all of these cases, the attack relies on the victim playing along and would fail without the victim’s compliance.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Gnome 47.1 Released with a Few Fixes
The latest release of the Gnome desktop is all about fixing a few nagging issues and not about bringing new features into the mix.
-
System76 Unveils an Ampere-Powered Thelio Desktop
If you're looking for a new desktop system for developing autonomous driving and software-defined vehicle solutions. System76 has you covered.
-
VirtualBox 7.1.4 Includes Initial Support for Linux kernel 6.12
The latest version of VirtualBox has arrived and it not only adds initial support for kernel 6.12 but another feature that will make using the virtual machine tool much easier.
-
New Slimbook EVO with Raw AMD Ryzen Power
If you're looking for serious power in a 14" ultrabook that is powered by Linux, Slimbook has just the thing for you.
-
The Gnome Foundation Struggling to Stay Afloat
The foundation behind the Gnome desktop environment is having to go through some serious belt-tightening due to continued financial problems.
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.