CRMN 3021U Chapter Notes - Chapter 4.5: Phishing, Email Spoofing, Online Identity
Document Summary
Banu, n. , banu, m. (2013) a comprehensive study of phishing attacks. Banu and banu (2013) explore phishing attacks and what exactly a phishing attack is. The authors begin by informing readers that phishing is now one of the highly used techniques in the world to steal data and perform fraudulent transactions. They define phishing as a form of online identity theft that aims to steal sensitive information such as online passwords and credit card information . The article then lists each form of phishing and explains what each means; beginning with clone phishing. Clone phishing is when a hacker find out what the victims frequently visited websites are, and makes cone copies of them. The purpose of this attack is to gain login credentials, which allows hackers to save them from the fake website in order to use them on the legitimate site. The second type of phishing is spear phishing.