Phishing vs Scareware

How Phishing & Scareware can affect the customer’s important data?


PHISHING

Phishing is a fraudulent technique that is used by the attacker through emails, websites and other types of electronic communication mediums. The attacker attempts to get the personal information from the people illegally which includes credit card or bank account number and its pin code, username, password and other sensitive information. Attackers use several types of techniques of phishing to deceive users.

  • Spam Email:
In this technique, the attacker sends a fake email message to many users. This message includes fake information that requires the readers of this message to enter their personal information by clicking on fake links in the email. When users fill out the form and enter their personal detail then the attacker gets all his detail and use for wrong purposes. 

  • Key Loggers:
It is a kind of malware. In this technique, the hacker gets the personal information of users when they click keyboard buttons to enter their personal detail on websites.

  • Search Engine Phishing:
In this technique, the attacker develops a very attractive E-commerce websites which offer different kinds of products with fake information. After that these websites are linked with different search engines. The user searches different products on search engines and reaches these websites. When they try to buy these products in these fake websites and enter their credit card information then all their information is sent to the hackers.

Web Trojans, Session Hijacking, DNS Based phishing and Hosts file poisoning is other examples of phishing.

SCAREWARE

Following Scareware techniques are used by the scammer to attract the users and attack on them.

  • Windows Pop-up Advertisements:
It is dangerous software that produces pop-up messages to show that your system is infected by viruses and you need to scan your system. It directs the user to the website from which the user can purchase and download the antivirus software. When the users download and install this software in the system, the malware also enters into the system. It may steal the personal detail of users from PC. It may affect the operating system files and makes the system unusable.
Some time hacker makes the pop-ups very cleverly. When the users are not interested in this popup message and click on the cross button on a popup then this fake or useless software automatically download and install on the system. After that, it will affect the files or hack important data from the system.

  • Scareware Fake Customer Services:
In this method, the scammer chats with the user and show them they are trying to solve their PC problems. They send a fake link to the user during the chat. When the user clicks on it then the scammer can easily get remote access to the user’s PC and hack all their personal details.