Phishing Attacks Essay
The friend search
Most of the social networks sites have a way to search for friends through you email. A hacker can have a pop up to find you friends, which requires the user to enter their email and password.
Hackers use twitter but tweeting short URL replica versions of the twitter site, and the site then requires the user to log in again giving their login information to the hacker.
Phishing has caused allot of financial damage. During the time between May 2004 and May 2005, about 1.2 million computer users had experiences loss caused by phishing in the United States. The total damage was $929 million. In 2007, the attacks saw a huge increase to 3.6 million users and about $3.2 million lost. The three useful ways to protect against phishing are social responses, technical responses and legal responses. Social responses are done by the public and business. People can change the way they browse the internet. For example instead of clicking hyperlinks they can type the companies URL in the address bar. For business they should add a solution for users to authorize the email is legit. Technical response also plays a huge role in protecting against phishing. The most important is