Joke Collection Website - Public benefit messages - What is phishing software?
What is phishing software?
Phishing software usually uses well-designed fake web pages to lure users into being deceived to steal bank account numbers, credit card numbers, etc., which is illegal.
Phishing usually refers to websites that disguise themselves as banks and e-commerce and steal private information such as bank account numbers and passwords submitted by users. You can use Computer Manager to detect and kill them. "Phishing" is a type of online fraud, which refers to criminals using various means to counterfeit the URL address and page content of a real website.
Or use vulnerabilities in the real website server program to insert dangerous HTML code into some web pages of the site to defraud users of their bank or credit card account numbers, passwords and other private information.
The most typical phishing attack lures the recipient to a carefully designed phishing website that is very similar to the website of the target organization, and obtains the sensitive personal information entered by the recipient on this website. Usually this The attack does not alert the victim.
Extended information:
There are many "phishing" methods used by online hackers, which can be summarized as follows:
1. Sending spam emails Luring users into taking the bait
This type of method uses false information to lure users into the trap. Hackers send a large number of fraudulent emails. These emails often use content such as winning prizes, consultants, and reconciliation to lure users into filling in their financial account numbers and information. Password, or for various urgent reasons, require the recipient to log in to a webpage and submit user name, password, ID number, credit card number and other information, and then steal user funds.
2. Establish fake online banking and online securities websites
The hackers defrauded user accounts and passwords to carry out theft. The hackers established domain names and web page contents that were very similar to real online banking systems and online securities trading platforms. Websites that induce users to log in and enter information such as account numbers and passwords, and then steal funds through real online banking and online securities systems.
3. URL hiding
According to the rules of Hypertext Markup Language (HTML), hyperlinks can be made to text, which gives phishers an opportunity. Looking at the source code of the letter will quickly reveal the mystery, as the phisher wrote it like this. In this way, Bbank's URL is displayed on the screen but it actually links to Abank's trap website.
4. Use fake e-commerce to commit fraud
Hackers set up e-commerce websites, or publish false product sales information on relatively well-known and large e-commerce websites. Hackers After receiving the victim's shopping remittance, he disappeared. Except for a few hackers who build their own e-commerce websites, most hackers are employed on well-known e-commerce websites.
5. Use Trojans and hacking techniques to steal user information and then commit theft
Hackers spread Trojan programs by sending emails or hiding Trojans on websites. When users infected with Trojans During online transactions, Trojan horse programs can obtain user accounts and passwords and send them to designated email addresses. User funds will be seriously threatened.
6. Use vulnerabilities such as weak user passwords to crack and guess user accounts and passwords
Hackers use some user passwords to set accounts that are too simple to crack account passwords. There are many weak password cracking hacking tools available for free download on the Internet. They can crack various relatively simple usernames and passwords in a very short time.
Baidu Encyclopedia - Fishing Website
Baidu Encyclopedia - Fishing
People's Daily Online - "Technology Geek" was sentenced for illegally profiting from "online game gift package website" by phishing and stealing accounts
- Previous article:How to edit contacts on Redmi 6 mobile phone?
- Next article:How to recharge ant treasure card how to recharge ant treasure card
- Related articles
- Will Fanpujinke loans overdue be prosecuted?
- What's the matter that Nokia N78 mobile phone can't receive the information from [10086] information desk? How to adjust it to receive it?
- What do you recommend for black tea cheesecake?
- Is it reliable to find a job in the market? . Hurry up! ! !
- I can't unsubscribe from the meteorological short message, saying that the business I visited is temporarily inaccessible.
- How to use the SMS storage of telecom SMS assistant?
- Is there a charge for unsubscribing within 72 hours after the SMS service of China Telecom is launched?
- What are the preparations for the meeting?
- 20 1 1 Zhejiang college entrance examination (Wenzhou) specific process
- Why can't Huawei mobile phone refuse MMS, blacklist the account that sent MMS to me, and receive MMS every day?