Paradise

W3LCoM3 tO OuR WoRLd...

Showing posts with label week 4. Show all posts
Showing posts with label week 4. Show all posts

The defination of phishing given in wikipedia.com, it is a process of trying to get some privacy information such as username, password, bank acoount and etc by act as a trustwothy entity that communicate in electronic form. The initial term is phishing was' fishing' , in year 1987 and started use term of 'phishing' in year 1996, it probably influence by word 'phreaking'.

Phishing usually carried out through e-mail or instant messaging. It will lead users to enter into an fake website that are looks and feels very similar to a legitimate website. Although there are ways to identify it, it needs professional and complicated skill to detect it.

Let's have a look of some example of phishing, ( click on the image to view larget image )


i)




ii)


iii)





There are few methods to prevent loss from phishing,

i) Don't forge easily although there is a header. As mentioned in the Example (ii) of phishing, there is a YAHOO logo as the header of the mail, don't try to move on but analyse the validity of mail.

ii) Avoid filling out forms in e-mail messages. We can't know the certainty where the data will be sent and the information may have several stops on the way to the recipient. While information being send, there might be third party accessing ourinformation be it reach to destination. Usually, reputable company do not request their customer to update their file or verify their privacy and security information through e-mail, they will contact the customer dierectly.

iii) If you click on a link in an e-mail message, veirfy the legitimacy of the web address with the company DIRECTLY before sending any privacy information.Some of the phishing will add some other link such as agreement, policy and etc. Only those link is linked to the company but the link to obtain your information might not from the company.


Reference:

Phishing. 28 June 2009, from http://en.wikipedia.org/wiki/Phishing

SonicWALL Phishing and Spam IQ Quiz. 28 June 2009, from http://www.sonicwall.com/phishing/

Watch Out for "Phishing" Emails Attempting to Capture Your Personal Information. 28 June 2009, from http://www.privacyrights.org/ar/phishing.htm







Nowadays, cases of hackers increase rapidly. This kind of crimes happened at every nook and corner of the world. In order to lessen the chances of becoming one of the victims, we should protect and manage our privacy well. A good control over privacy will make sure our personal and private data are in a secure and safe level. Appropriate steps should be taken to protect our data.


1. Keep the identification numbers or passwords confidential. We should not share these private data with others. Also have to make sure to change the passwords frequently.

2. Always sign off the web sites after finished using it, especially online at cyber café. Make sure closed all the windows before you leave.

3. Shred the old statements or cut the no longer use credit cards / debit cards into small pieces before discarding them into dustbin. Make sure the number of the cards is not recognizable.

4. Retain your receipts after transactions. Match the receipts against the statement. Make sure there is no suspicious transaction. Keep the statements that contain sensitive information in a safe place.

5. Do not reveal the privacy information to third parties, particularly to those who soliciting sales over the phone. Only give out the information when you know who the person you are dealing with is.

6. Update the computer security system regularly. A case in point is firewall system. It’s useful to detect and prevent the virus from attacking the computer system. Also keep a back-up duplicate copy in a secure place.


Reference:
1. Safeguarding your financial security: How to protect your privacy and safeguard against credit card fraud and identity theft. 27 June 2009, from http://www.bankofamerica.com/privacy/pdf/fin_security.pdf




Online transaction is a very popular method for people around the world to do business. It is easy, fast and the transactions could be done at anywhere, anytime. But since it is paperless and deal on the internet, have you ever think about the security of those transactions?





To enhance the security of online business, Third Party Certification(TPC) programme was invented. TPC ensure that information were traveled to the desired locations and received by intended person. By doing this way, the website can be more reliable. TPC can safeguard the electronic documents from unauthorized changes because people cannot simply edit the content without verification or password that were provide by TPC companies. There are few websites that provide more details information regarding TPC.




One of them is TRUSTGATE. User can find many products and services that provided by them to secure people's information.
VERISIGN is another company that provide similar services.


here are few reference sites that you can get more informations :
http://www.msctrustgate.com
http://www.verisign.com


Reviewing post: "Spammer Agrees to $10 million settlement http://ecommerze.blogspot.com/search/label/Internet%20Security

When we type “Ryan Pitylak” in any search engine, there are many results about Anti-spam activists, affiliate marketing services, viral marketing, anti-spam services, and so on. Well, his name is blacklisted previously as he is known as “spam king” at year 2004.

The man who was tricking people by sending 25 million spam-mails a day, now is turning a new leaf. I had viewed his blog: http://ryanpitylak.blogspot.com and it showed that “Ryan Pitylak” is one of anti-spam community. He provides services in stopping spam from spammers. He also provides other services as I mentioned above.

Graham Cluley of Sophos (1 of IT Security Company) said, "Spammers like Pitylak have shown themselves to be prepared to break the law in their eagerness to pump out unwanted marketing messages. Some companies may feel uncomfortable about working with someone who has shown a history of behaving unethically, without caring about the consequences for other internet users."

I think that we should give opportunity to wrong-maker because everyone would make mistake. People may change to be better. Besides, his previous experience is worth to the organization who hires him as he can provide more efficient way to fight against spam.

Now, he set up his own company, Pitylak Security. I believe that the person who can learn from mistakes and correct those mistakes will be successful

Announcement

Thank you for visiting our blog , please to be informed that Internet Explorer user may have difficulty to view our blog ,
Mozilla firefox will helps to settle this issue.
Feel free to visit our blog !

About Us

My photo
H3LLO, let's introduce our group member in Paradise. They are Pong Zi Kang(Gary), Gary Choo Wai Kit, Chua Sheng Ann and Soon Yoon Yee. We are glad to be in the same team because we all like sharing information with the others. Hope out blog can bring more information to you all ^^

Blog Archive

ChatBox