The 10 big safe risks that you did not realize (2)
From;    Author:Stand originally
Network fisherman cudgel one's brains for imitates lawful website

Endanger grade: Gao Yi gets attack rate: High end: All network user

Network fishing is the most effective purloin the means of useful information, so it develops very quickly. Turn over network fishing to organize the report statistic with newest APWG to point out, in April 2006 portion, the network fishing website that has a record achieved 11121, and in April 2005 portion, network fishing website has 2854 only merely.

Perhaps, you can think the convict that founds these network fishing websites just is a few spare players, need to pass their casual spelling mistake only, or it is a few coarse graph interfaces, with respect to the true and false that can identify their website. Actually this kind of idea is wrong, because present network fisherman also is innovating ceaselessly, they had gone by hand rarely copy risks existing bank lawful webpage. Present bilk gang uses a server to carry software commonly, this software is OK and direct the text target bank website, graph and link drawing come over. Once ascend such website, you do not discern at all the true and false that gives a website. And want you to input entry information only, these information can pass network fisherman directly on the hand.

Present network fishing website becomes very tricky, they even can trap calculate those are careful and the network user that has experience. Be in this year April, the expert that haing Buddha university and California university uncle capture interest component officer published a problem to be jointly " why can fishing of network of Why Phishing Works(gain a success) " paper, they undertake to crowd of one subgroup random sampling is analysed, the fishing email that studies them to high high to whether will discern through simple judgement true and false, or it is to distinguish lawful website and bilk website. The participator with findings a lot of more existing hair is indistinguishable come out. Still point out in this paper, the network fishing website that has pretended had cheated the eye of more than 90% participator even.

Attack example:  of Kun of  string catfish helps coil up article  of ┢ of chrysanthemum of 7 random   does not have  bank

  Browse direct again make you impossible to defend effectively

Normally the circumstance falls, coax person always use email and use a few excuse, be like: Their bank records a data to need to update, or because install the change of whole journey foreword to need to check user data afresh,wait, with date of diddle user Zhang and relevant password countersign. If you issue the link that the person that clicked coax provides in the circumstance that is without suspicion, in order to check your Zhang number information, your bank information by " angle " went. But now, coax person the website that can use more convincing method to guide you to browse them.
Previous12 Next