Changes

no edit summary
Line 1: Line 1:  
'''Phishing''' represents the fraudulent acquisition of personal and financial information like credit card information and passwords.<ref>[http://www.wordiq.com/definition/Phishing Phishing definition]</ref>
 
'''Phishing''' represents the fraudulent acquisition of personal and financial information like credit card information and passwords.<ref>[http://www.wordiq.com/definition/Phishing Phishing definition]</ref>
   −
==Overview==
   
The theft of financial and personal data is achieved through deceptive means such as fraudulent emails and copies of legitimate websites.<ref>[http://dictionary.reference.com/browse/phishing Phishing features]</ref> Brand spoofing and carding are forms of phishing.  
 
The theft of financial and personal data is achieved through deceptive means such as fraudulent emails and copies of legitimate websites.<ref>[http://dictionary.reference.com/browse/phishing Phishing features]</ref> Brand spoofing and carding are forms of phishing.  
   −
==Phishing history==
+
==Phishing History==
 
Phishing scams first appeared during the 1990s on AOL. Emails that appeared to come from AOL but were actually from a hacker requested users to update their personal and financial information via email, causing many people to expose their information, which was abused by the hacker. The problem back then was that AOL permitted the creation of a fake account by means of a credit card generator, but after these attacks AOL had to change this technique. <ref>[http://www.allspammedup.com/2009/02/history-of-phishing/ Phishing history]</ref>
 
Phishing scams first appeared during the 1990s on AOL. Emails that appeared to come from AOL but were actually from a hacker requested users to update their personal and financial information via email, causing many people to expose their information, which was abused by the hacker. The problem back then was that AOL permitted the creation of a fake account by means of a credit card generator, but after these attacks AOL had to change this technique. <ref>[http://www.allspammedup.com/2009/02/history-of-phishing/ Phishing history]</ref>