computer services venturacomputer services venturacomputer services venturacomputer services ventura
  • HOME
  • TESTIMONIALS
  • ABOUT
  • PORTFOLIO
    • Logos
    • Web and Social Media
    • Print Media
    • Business Media
    • Ads
    • Photography
    • Video
    • Tech Work
  • SERVICES
    • Creative Services
    • Smart Home
    • Technology Services
  • BLOG
  • CONTACT
  • Privacy Policy
  • Terms and Conditions
Safeguarding Yourself From Cybercrime Don’t become a victim!
March 7, 2019
High-Tech Fraud : Phishing
March 7, 2019

More On Cybercrime Techniques

Common Cybercrime Techniques

1.) Phishing e-mails mimicking online businesses or banks in an attempt to fool people into freely giving out confidential personal and financial information. URL Obfuscation is the part of the phishing scam that really plays on human error and our brain’s ability to “fill in the gaps” automatically by sending a victim to a fraudulent web site address that looks almost exactly like a real address (i.e. www.pay-pal.com versus www.paypal.com).

2.) Pharming is another form of phishing that “poisons” a person’s computer’s DNS cache and redirects visitors from a real web site to a bogus mirror site. Every web site has its own internet address and the Domain Name System (DNS) translates the IP address into the host name. A DNS cache poisoning changes the entries in the computer so when the legitimate site is typed in, the victim is sent to a fraudulent web page instead.

3.) Trojan Horses are malicious software files that infiltrate your PC by hiding in seemingly innocuous files. Some Trojans, called “keystroke loggers,” record every one of a person’s keystrokes and send that information back to the attacker.

4.) Zombie Computers and Man-In-The-Middle Attacks are part Trojan and the malicious software that is installed on the victim’s computer allows that person’s PC to be controlled remotely by their attacker without their knowledge. The Man-In-The-Middle attack is frequently partnered with an “Evil Twin” which is a fake wireless internet hot spot connection that looks almost like a legitimate service. When the victim attempts to connect, the criminal launches a transaction to get the victim’s credit card information in the form of a standard pay-for-access deal to use the wireless internet.

~ TeCHS

www.ezDigitalLife.com

Your Digital Life Simplified!

Share
0

Related posts

January 3, 2021

10 Quick Cybersecurity Tips to Start the New Year


Read more
December 4, 2020

The Top 12 Holiday Scams to Avoid This Season


Read more
2F Authentication
August 11, 2020

What is Multifactor Authentication and why do you need to use it?


Read more

(800) 669-2022

Need a hand with your tech?

Give us a call!

GET OUR NEWSLETTER!

Want awesome tech tips & tricks sent directly to your inbox? Get our newsletter!

* indicates required





RECENT ARTICLES

  • 10 Quick Cybersecurity Tips to Start the New Year
  • The Top 12 Holiday Scams to Avoid This Season
  • Shop our Handmade Items
  • What is Multifactor Authentication and why do you need to use it?
  • How to Create a Secure Password
© 2021 TeCHS. All Rights Reserved.