Phishing: Difference between revisions
Line 13: | Line 13: | ||
* The development of a legitimate website copy | * The development of a legitimate website copy | ||
* Session Hijacking | * Session Hijacking | ||
* Fooling Internet users to submit financial and personal data or passwords | * Fooling Internet users to submit financial and personal data or passwords | ||
* Emails that claim to be sent on behalf of well-known organizations | * Emails that claim to be sent on behalf of well-known organizations |