What is phishing?
Answers were Sorted based on User's Feedback
Answer / vijaysivadas
Phishing is an attempt to illegally gain access of the
sensitive informations like Username & passwords.
Basically its done thru email & Instant messenging
eg.Targeting the bank sites ,Ebay .
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / shashank
Phishing is 1 of hacking method basically used to gain the
victims information for malicious purpose.Its normally done
by using spam mails,commercial websites. The best
precaution is do not click on unknown links.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / binny jacob
Phishing is the fraudulent,social engineering process of
trying to extract information form a victim, like user names
passwords or even account or credit card details through
the medium of email or instant messaging. Phishing mails are
disguised to appear as if from a legitimate institutions
like pay-pal rapid share or any banks giving them fake links
and asking them to confirm some details at that site and
thereby trapping unsuspecting victims.
infamous episodes of phishing occurred post 9/11 in USA
disguised as mail from many institutions asking them to
authenticate their details of different accounts or
threatening them with legal actions.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / amitmalik(amity)
hii
phishing is done by black hat hackers to stole the senstive
information via mail address, web sites by use of cross site
scripting(XSS)
| Is This Answer Correct ? | 2 Yes | 2 No |
What database Active directory contains?
5 Answers HP, IBM, Infosys, Infotech, Symantec,
What is a DNS resource record
How I recover my windows 7 password? ps: When I try to log on my computer as common, the screen display the error"the user or password is incorrect"
What is Cross site scripting?
What is the difference between cybersecurity and information security?
What are the different Kinds of Malware?
What are the methods of defense (in context to IT-Security)?
What is Cross Site Request Forgery and how to defend against it?
What is ospf protocol
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
how secure is SAP applications?
Explain how do we use rsa for both authentication and secrecy?