1stSpywareKiller.com

 
Stop Spyware and Adware Infecting Your Computer
Computer Security Secrets Revealed
Discover our Free Anti-Spyware Guide & Tips Now!

www.1stSpywareKiller.com

 


What Should be Known About Phishing - 2



Another common method which is usually used by phishers is to put up a link in an email that might belong to a false company. These are often misspelled URLs or sub domains which are given in order to trick any potential victims.

Try to always write down the web address and verify the @ symbol. For example, http://[email protected]bers.tripod.com might be a link that could easily disappoint anyone who might be casually surfing on the page. Nevertheless, whoever clicks on this will just be directed to a page that might simply not really exist.

In order to find a solution to this problem, Internet Explorer and Mozzilla try to give their users the option of either continuing or canceling their surfing. With a warning message, the user can go or not to that questionable page.

There are a few phishing scams that might make use of JavaScript commands. These tend to modify the address bar and are carried out by imposing a picture of a credible entity URL over it. The result is that it visually tricks any casual Internet user.

Another phishing method is the cross-site scripting. In this case, the culprit might make use of a legitimate company’s own scripts on a potential victim. By doing that, the user is then directed to sign in for the services of the imposed company. The security certificates and web address that show on the page might seem right to the non-professional eye. However, in truth, this link the potential victim has clicked on, might be a means for a phisher to realize his personal and financial information.

Click to the next page for some more tips on computer protection:
What Should Be Known About Phishing - 3

 

56949547473b6cf516146660d5fdb1a2