What is phishing?

Answers were Sorted based on User's Feedback



What is phishing?..

Answer / vijaysivadas

Phishing is an attempt to illegally gain access of the
sensitive informations like Username & passwords.
Basically its done thru email & Instant messenging

eg.Targeting the bank sites ,Ebay .

Is This Answer Correct ?    4 Yes 0 No

What is phishing?..

Answer / shashank

Phishing is 1 of hacking method basically used to gain the
victims information for malicious purpose.Its normally done
by using spam mails,commercial websites. The best
precaution is do not click on unknown links.

Is This Answer Correct ?    1 Yes 0 No

What is phishing?..

Answer / binny jacob

Phishing is the fraudulent,social engineering process of
trying to extract information form a victim, like user names
passwords or even account or credit card details through
the medium of email or instant messaging. Phishing mails are
disguised to appear as if from a legitimate institutions
like pay-pal rapid share or any banks giving them fake links
and asking them to confirm some details at that site and
thereby trapping unsuspecting victims.
infamous episodes of phishing occurred post 9/11 in USA
disguised as mail from many institutions asking them to
authenticate their details of different accounts or
threatening them with legal actions.

Is This Answer Correct ?    1 Yes 0 No

What is phishing?..

Answer / amitmalik(amity)

hii
phishing is done by black hat hackers to stole the senstive
information via mail address, web sites by use of cross site
scripting(XSS)

Is This Answer Correct ?    2 Yes 2 No

Post New Answer

More Networking Security Interview Questions

What are the methods of defense (in context to IT-Security)?

2 Answers   Taylor Engineering,


How does dlp work?

0 Answers  


What is shadow it?

0 Answers  


What are the different Kinds of Malware?

1 Answers   Infosys,


What is a Password?

0 Answers  






What is a wild card certificate ? can I use it for all my appliance in the network ?

2 Answers   HCL,


WHAT IS DATA EXECUATION PREVANTION

1 Answers  


What is the purpose of a firewall?

4 Answers  


SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)

4 Answers   SAP Labs,


What is the idea behind the Bell-La Padula model?

0 Answers  


Which are the different factors that affect the security of a network?

0 Answers  


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)