![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Phishing and Pharming: Dangerous Scams
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how? Two Pharmings Actually, two completely different fields use the term "pharming" now. We can say there exist two separate "pharmings". If genetics or businessmen from pharmaceutical industry are talking about pharming (spelled like that) it might have nothing to do with computers. This word has long been familiar to genetic engineers. For them, it's a merger of "farming" and "pharmaceutical" and means the genetic engineering technique -- inserting extraneous genes into host animals or plants in order to make them produce some pharmaceutical product. Although it is a very interesting matter, this article is not about it. As for PC users, the term "phishing" recently emerged to denote exploitation of a vulnerability in the DNS server software caused by malicious code. This code allows the cybercriminal who contaminated this PC with it to redirect traffic from one IP-address to the one he specified. In other words, a user who types in a URL goes to another web site, not the one he wanted to--and isn't supposed to notice the difference. Usually such a website is disguised to look like a legitimate one -- of a bank or a credit card company. Sites of this kind are used solely to steal users' confidential information such as passwords, PIN numbers, SSNs and account numbers. Dangerous Scams A fake website that's what "traditional" phishing has in common with pharming. This scam can fool even an experienced computer user, and it makes pharming a grave threat. The danger here is that users don't click an email link to get to a counterfeit website. Most people enter their personal information, unaware of possible fraud. Why should they suspect anything if they type the URL themselves, not following any links in a suspiciously-looking email?Unfortunately, "ordinary" phishers are also getting smarter. They eagerly learn; there is too much money involved to make criminals earnest students. At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more fraudulent websites looked like legitimate ones. Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information. It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively. Spy Audit survey made by ISP Earthlink and Webroot Software also shows disturbing figures - 33.17% PCs contaminated with some program with information stealing capability. However, more sophisticated identity theft attempts coexist with "old-fashioned" phishing scams. That is why users should not forget the advice which they all are likely to have learned by heart:
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables information-stealing programs.Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Italian police increase security at Tesla dealerships after 17 cars destroyed in Rome fire The Guardian Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Space Security Sentinel Via Satellite Planning for your IAM Roles Anywhere deployment Amazon Web Services Mike Waltz’s team set up at least 20 Signal chats for national security work – report The Guardian Waltz and staff used Gmail for government communications, officials say The Washington Post Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News New allegations against the White House’s Waltz suggest Signal chat scandal isn’t over MSNBC News Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges Yahoo Finance Charges Filed Against Former PUSD Security Guard Pasadena Now HPD, Homeland Security bust multiple game rooms FOX 26 Houston New security system coming to Alaska’s Capitol building Your Alaska Link Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle Parliament speaker Stefanchuk blocks Poroshenko’s US trip to international security conference, party says The Kyiv Independent ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch National security implications of tariff announcement LiveNOW from FOX Security by Design Requires Organizational Commitment BankInfoSecurity Security forces report 80% drop in Ramadan terror attacks, after West Bank crackdown The Times of Israel Women in Security: Alice DiSanto, VP of Marketing, Autonomous Solutions Inc. Security Sales & Integration Security firm Brinks Home sells Lancaster city location LancasterOnline ISC West 2025 Show Floor Spotlight: PROMETHEUS Security Info Watch When will your Social Security benefits arrive in April? See 2025 payment schedule Democrat and Chronicle Coral Gables commissioner raises concerns for security of elected officials NBC 6 South Florida Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles Secure Passage and Sunflower Labs take security to the skies with autonomous drone integration Police1 Contrast Security Debuts 'Channel-First' Strategy Channel Futures Marlink New Cyber Company to Meet Customer Demand for Security & Compliance - The Maritime Executive Marlink New Cyber Company to Meet Customer Demand for Security & Compliance The Maritime Executive Why Active Directory’s 25-Year Legacy Is a Security Issue BankInfoSecurity Diversus Health adds new Security-Widefield location FOX21 News Colorado Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight 2025 SAMMY Awards Winners Honored at ISC West 2025 Security Sales & Integration |
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. ![]() |
home | site map |
© 2006 |