Skip to main content

What is phising ?



Source : https://dewailmu.id
Phising is a method to do some scamming to steal data from target, phising mean fishing, so phising is fishing target to the trap. Phising also steal important data like account or credit card (also called carding). Phising also use email to scam the target, the suspect send email to target, the email resemble the official, the email contain link direct to fake website, the target think its not fake and they will fill the data, and data will be sent to the suspect. The data will used by the suspect, they also can sell it.
                How to prevent phising ?. First, don’t click randomly at any link and fill the data, just click trusted link or website, or check twice or more times because the suspect make use of inaccuracy. Example, the suspect make link named Faceook.com, which it should be facebook.com. second, don’t reply email from people that you didn’t know. Third, recognize the phising website, the phising website require you to fill important data. Fourth, if you want to buy something online, just buy in official commercial, because if you buy in not trusted commercial, maybe they will sell your credit card data.

Referensi

Name    : Sahid Fadhil Anandra
NIM       : 106218035

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...