Leveraging Information Technology for Inter-Sectoral Research |
Foundation of Computer Science USA |
ICAIM2017 - Number 2 |
February 2019 |
Authors: Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S. |
adb8ecba-b047-4a19-95d7-67b5e3c9887f |
Mamta Patel, Vandana Patel, Hardik Pillai, Sreeja S. S. . Phishing Technique. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 2 (February 2019), 5-8.
Phishing is fraud. In phishing the attacker tries to read or retrieve information of a person. In this technique, the target gets a massage that appears that it is sent by some known person or reputed organization. On clicking the links in the message, it will install the malware on targeted device which will direct the target to a malicious website set up to trick them into displaying their personal and financial information, such as passwords credit card details. It is very much popular with cyber-criminals. Because it is very easy to make someone into clicking malicious link and get the details out of them rather than trying to seek through in someone's computer. The person who tries to do phishing use social networking sites and many other sources of information to collect the information about the target's personal history, their activities.