Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is phishing?

Answer Posted / binny jacob

Phishing is the fraudulent,social engineering process of
trying to extract information form a victim, like user names
passwords or even account or credit card details through
the medium of email or instant messaging. Phishing mails are
disguised to appear as if from a legitimate institutions
like pay-pal rapid share or any banks giving them fake links
and asking them to confirm some details at that site and
thereby trapping unsuspecting victims.
infamous episodes of phishing occurred post 9/11 in USA
disguised as mail from many institutions asking them to
authenticate their details of different accounts or
threatening them with legal actions.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is udp flood?

1137


What is next-generation firewall (ngfw)?

1151


What is ransomware?

1043


What is utm firewall?

1111


What is mesh network

1052


What do you do when you get blue screen in a computer? How do you troubleshoot it?

1097


How does the HTTP handle state?

1107


Why is it important to have a nac solution?

1246


What are the benefits of the firewall?

1103


How does a virtual private network (vpn) work?

1129


Explain what are all the technical steps involved when the data transmission from server via router?

1094


What is cybersecurity?

1080


What are the types fo ddos attacks?

1175


How does phishing work?

1029


What are the possible ways of data exchange

1098