![]() ![]() Cyber crimes cause a great loss to national and international business community. This thesis appraise that cyber legislation has become a constant dilemma of Pakistan. Finally, a number of security countermeasures are postulated that individuals and companies can implement to protect themselves not only from phishing but also from other forms of cybercrime. In this article, the different types/categories of 'cybercrime' are firstly defined to, secondly, contextualise e-mail scams/frauds and thirdly, to track the changes to the latter and to point out some of the mistakes that enable one to identify it as a 'phishing' e-mail scam. ![]() This information then used in various cybercrime activities Over the years these e-mail scams have exhibited a changing and more innovative approach from winning lotto 'millions', verifying your banking details on an exact bank replica website to receiving a 'greeting' e-card from a family friend, 'school-mate', colleague or even 'partner' which requires you to click on an Internet address and copy and paste it (the greeting e-card) into your browser's address box (this enables 'spyware' to be inserted on your computer). In effect these e-mails are false ('spoofed') designed to lead a recipient/s to counterfeit websites that aim to trick them into divulging financial data such as account usernames and passwords. The technical definition for 'phishing' is that type of online identity theft that employs an approach to a potential victim via an e-mail in order to steal both a recipient's personal identity data and financial account credentials. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |