Free Business Listing

Phishing Cyber Attack

A phishing cyber attack is launched through the sources you generally use such as email or the apps on your smart phones.

A phishing attack has different types such as:

  • Phishing attack: It is targeted to a general public.
  • Spear phishing attack: It is used to target to a specific person or a company.
  • Clone phishing attack: A duplicate page is created on a site which is replaced with a real website. For example; a hacker will use a domain name  “Aple.com rather using “Apple.com”.
  • Phony or Puny attack: It is the most sophisticated form of a phishing attack and at least 90% web users may become become a victim of this attack. This attack launches same domain name (apparently) with the SSL certificate. A naked eye can hardly recognize it, rather you need an “Eagle Eye” to recognize it.

Relationship between a social engineering and cyber attack?

A phishing attack is designed through a social engineering. A demand and  interested is monitored of a user to launch an attack accordingly.

  1. What does a user want to know?
  2. Does a user want to hear a obsessional news?
  3. Does a user want to know about great offers?

After analyzing the interest of a user, a well planned campaign is designed and emails, pop-up ads , cookies and attachments are sent with a malicious malware to fulfill a user's demand apparently. A reason of this process is to use a user's identity to conduct a crime electronically.

How to recognize whether the message is a real or fake?

  1. Take your time and judge to see with your “Eagle Eyes” not “ A Naked Eye” that it makes sense and do not click a link or attachment until you are % sure about good and bad.
  2. Type a real website in browser to visit, rather use a lying link on your P.C or the internet.
  3. Call to the company, use live chat or send an inquiry to confirm the message and the special offers, rather you trust on a message containing in the email with malware.
  4. Report to the phishing or transfer in a block list to avoid receiving unwanted emails.
  5. Update browsers and settings of the browsers.

Few most used examples of the phishing attacks:

Example One:

A hacker sends an email from your friend's email which is actually hacked, and request to transfer some money that I urgently needs or like my Facebook account page. A hacker will steal your bank account information or the Facebook credentials, if you followed the instructions of the email without your knowledge.

Example Two:

Phony or Puny Cyber Attack Example: A web user has to be very carefully slip from an attacker who has an ability to deceive a user very cleverly. Under this attack, a hacker buys a duplicate domain name of a trademarked and famous company.

Like Apple.com or Chase.com and apparently this looks impossible to buy a same domain name which is already in use.

But, a hacker has made it possible, and it is done by a Chinese hacker recently. You will find a 100% same domain name  on the internet of Apple.com with the SSL certificate and it will open in HTTPS.

How does a hacker publish a duplicate domain name on the internet?

  1. A hacker makes a combination of the letters contains in a real domain (Apple.com) with the help of a programming code.
  2. A hacker buys a domain with the SSL certificate, according to a programming coding results. For Example; akete078.com represents Apple.com.
  3. A hacker will create a duplicate page like apple and map it with an Apple.com coding to deceive a client.
  4. It will be almost impossible for a web user to distinguish between a good and bad website.

 

636

Requirements for setting up limited partnership

Create Limited Partnerships such as LP, LLP or LLLP to start your business. Limited Partenships can be created by one person only.