![]() ![]() The technological sophistication serves to reduce the awareness that the consumers are being scammed through phishing. The significant factors that phishing criminals have exploited include the unawareness of potential threat by the internet users, the users being unaware of the organizational policies used in communication with the customers and the underlying technological sophistication such as Denial of Service and spam (Lance, 2005). Phishing can be executed in a number of ways due to increased embracement of online services in daily transactions such as online banking, e-commerce and other online communications. This paper will lay emphasis on the technologies that phishing criminals deploy and the technical strategies that can be used to counter phishing. The onset of the internet only served to ease the process of execution of phishing attacks (Ec-Council, 2009). Attacks related to social engineering has been evident on the course of existence of the internet, and even before the onset of the internet, criminal deployed other technological frameworks such as the telephone to obtain confidential data by pretense of being trusted agents. BackgroundÄeploying tricks to obtain sensitive information from people for malicious reasons is not a new concept, and has been in existence for a long time. This paper investigates the various technical procedures used in the execution of the phishing scams highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of phishing scams. ![]() The outcome of this is the larger non-technical population can execute phishing. In addition, the internet has facilitated the automation of such technical resources facilitates the initiation of phishing even by non-technical internet users. The technological requirements needed to initiate phishing attacks are easily available in public and private sources (Ec-Council, 2009). Scams related to phishing have been on the increase in the recent times because of the promising technological and economical frameworks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |