9 SearchSecurity r Essential Guide g Se cure We b gate ways, from e valuation to se ale d de al phishing Poste d by Margare t Rouse WhatIs.com c s o n Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. FR OM THE ESSENTIAL GUIDE: Secure Web gateways, from evaluation to sealed deal 0 G UIDE S ECT IO NS 1. SWG basics 2. SWG pros and cons 3. Buying a se cure We b gate way 4. Def initions 1 2 f + Show More Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait. Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs), social security numbers, banking numbers, and passwords. This information was used for identity theft. The FTC warns users to be suspicious of any official-looking e-mail message that asks for updates on personal or financial information and urges recipients to go directly to the organization's Web site to find out whether the request is legitimate. If you suspect you have been phished, forward the e-mail to spam@uce.gov or call the FTC help line, 1-877-FTC-HELP. Pro+ Features Enjoy the benef its of Pro+ membership, learn more and join. 7 E-Han dbook x E-Zin e x E-Zin e The transformation of wireless network security 2014 Security 7 Award Winners Security Readers' Choice Awards 2014 Resources from around the Web Phishing - Wikipedia, the free encyclopedia Explains some common phishing methods and dangers. en.wikipedia.org/wiki/Phishing Anti-Phishing Working Group Our mission is to provide a resource for information on the problem and solutions for phishing and email fraud. www.antiphishing.org/ OnGuard Online - Phishing Phishing section of an informational website run by the US Federal Trade Commission. Offers advice on how to spot, avoid and report phishing attacks. onguardonline.gov/phishing.html Recognize phishing scams and fraudulent e-mails Phishing is a type of e-mail scam designed to steal your identity. Learn more about how this scam works and what a phishing e-mail message may look like. www.microsoft.com/protect/yourself/phishing/identify.mspx Avoid Getting 'Hooked' By Phishers The most common form of phishing is emails pretending to be from a legitimate ... A spam filter can help reduce the number of phishing emails you get. ... www.fraud.org/tips/internet/phishing.htm This was first publishe d in May 2007 qGlossary 'phishing' is part of the: Malware Glossary Security management Glossary View All Def initions Related Terms Operation Phish Phry Ope ration Phish Phry is a cybe rcrime inve stigation carrie d out by the Unite d State s Fe de ral Bure au of Inve stigation (FBI), the ... Se e comple te de finition q spear phishing Spe ar phishing is an e -mail spoofing fraud atte mpt that targe ts a spe cific organization, se e king unauthorize d acce ss to ... Se e comple te de finition q whaling Whaling is a type of fraud that targe ts high-profile e nd use rs such as C-le ve l corporate e xe cutive s, politicians and ce le britie s. Se e comple te de finition q r Essential Guide Se cure We b gat e ways, f rom e valuat ion t o se ale d de al G UIDE S ECT IO NS 1. SWG basics 2. SWG pros and cons 3. Buying a se cure We b gate way 4. Def initions z 1 comment Oldest 5 Share your comment Register or Login E-Mail email@techtarget.com Username / Password Username Password By submitting you agre e to re ce ive e mail from Te chTarge t and its partne rs. If Comment you re side outside of the Unite d State s, you conse nt to having your pe rsonal data transfe rre d to and proce sse d in the Unite d State s. Privacy Genderhayes — 12 May 2014 2:13 AM t Criminal activity of sending emails or having a website that is intended to trick someone into giving away information targeted advertising or the ‘pushing’ of people towards products and services -ADS BY GOOGLE Help Desk Software m anageengine.com /Help_Desk Help desk and IT Asset Management Purchases & Contracts. Try Now! Latest TechTarget resources CLOUD SECURITY SearchCloudSecurity A2 CSA to closely monitor enterprise cloud data privacy issues in 2015 NETWORKING CIO CONSUMERIZATION The Cloud Security Alliance says cloud data privacy has ENTERPRISE DESKTOP emerged as a top issue for industry amid Microsoft's battle with the U.S.... CLOUD COMPUTING 2 An introduction to Docker and its effect on enterprise cloud security COMPUTER WEEKLY Docker provides improvements for application virtualization, but what does it mean for security? Expert Ed Moyle offers an intro ... About Us Adve rtise rs Re prints Contact Us Busine ss Partne rs Archive Privacy Policy Me dia Kit Site Map Vide os Corporate Site Eve nts Photo Storie s Expe rts E-Products Guide s Shon Harris CISSP training All Rights Re se rve d, copyright 2000 - 2015, Te chTarge t