How Phishing & Scareware can affect the customer’s important data?
PHISHING
Phishing is a fraudulent technique that is used by the
attacker through emails, websites and other types of electronic communication
mediums. The attacker attempts to get the personal information from the people
illegally which includes credit card or bank account number and its pin code,
username, password and other sensitive information. Attackers use several types of techniques of phishing to
deceive users.
- Spam
Email:
In this technique, the attacker sends a fake email message to
many users. This message includes fake information that requires the readers of
this message to enter their personal information by clicking on fake links in
the email. When users fill out the form and enter their personal detail then
the attacker gets all his detail and use for wrong purposes.
- Key
Loggers:
It is a kind of malware. In this technique, the hacker gets
the personal information of users when they click keyboard buttons to enter
their personal detail on websites.
- Search
Engine Phishing:
In this technique, the attacker develops a very attractive E-commerce
websites which offer different kinds of products with fake information. After
that these websites are linked with different search engines. The user searches
different products on search engines and reaches these websites. When they try
to buy these products in these fake websites and enter their credit card
information then all their information is sent to the hackers.
Web Trojans, Session Hijacking, DNS Based phishing and Hosts
file poisoning is other examples of phishing.
SCAREWARE
Following Scareware techniques are used by the scammer to
attract the users and attack on them.
- Windows
Pop-up Advertisements:
It is dangerous software that produces pop-up messages to
show that your system is infected by viruses and you need to scan your system.
It directs the user to the website from which the user can purchase and
download the antivirus software. When the users download and install this
software in the system, the malware also enters into the system. It may steal the
personal detail of users from PC. It may affect the operating system files and makes
the system unusable.
Some time hacker makes the pop-ups very cleverly. When the
users are not interested in this popup message and click on the cross button on a popup then this fake or useless software automatically download and install on the system. After that, it will affect the files or hack important data from the system.
- Scareware
Fake Customer Services:
In this method, the scammer chats with the user and show them
they are trying to solve their PC problems. They send a fake link to the user
during the chat. When the user clicks on it then the scammer can easily get remote
access to the user’s PC and hack all their personal details.