what is fishing ,vishing, cyberstalking ,spoofing with proper explanation
Answers
Explanation:
What Is Spoofing?
Cyber criminals create pixel-perfect counterfeits of corporate emails to trick business owners into taking ill-advised actions. No one would deliberately download a Trojan packed with malware, but he might unwittingly do it if he thought his commercial accounts were prone to identity theft. Herein lies the premise of spoofing; an official-looking email from an important service provider instructs you to take precautionary actions to protect your finances or reputation. Corporate logos and other distinctive graphics are easy for hackers to hijack and embed in emails. These professional graphic elements convince end-users that an impending threat can be suppressed by following the sender’s instructions, which usually entails clicking on a link in the message. In most cases the link executes a malicious file that damages your operating system and critical applications while it propagates throughout your network, placing your clients and vendors at risk.
spi
In practical terms, phishing is a form of spoofing in that it deceives with legitimate-looking messages. Unlike spoofing, a phishing scam usually provides a link to a bogus website where the end-user is required to enter sensitive account information. The site may ask you to provide your social security number, tax ID or bank account information. Releasing this information could result in damage to your assets and an indelible mark on your credit rating. Hackers are adept at HTML design and Web programming, so the untrained eye can be easily fooled. Fortunately, for the time being at least, there are a few telltale signs that give these scams away including suspicious URLs and unsolicited attachments.Cyber criminals create pixel-perfect counterfeits of corporate emails to trick business owners into taking ill-advised actions. No one would deliberately download a Trojan packed with malware, but he might unwittingly do it if he thought his commercial accounts were prone to identity theft. Herein lies the premise of spoofing; an official-looking email from an important service provider instructs you to take precautionary actions to protect your finances or reputation. Corporate logos and other distinctive graphics are easy for hackers to hijack and embed in emails. These professional graphic elements convince end-users that an impending threat can be suppressed by following the sender’s instructions, which usually entails clicking on a link in the message. In most cases the link executes a malicious file that damages your operating system and critical applications while it propagates throughout your network, placing your clients and vendors at risk.
How Is Phishing Different?
In practical terms, phishing is a form of spoofing in that it deceives with legitimate-looking messages. Unlike spoofing, a phishing scam usually provides a link to a bogus website where the end-user is required to enter sensitive account information. The site may ask you to provide your social security number, tax ID or bank account information. Releasing this information could result in damage to your assets and an indelible mark on your credit rating. Hackers are adept at HTML design and Web programming, so the untrained eye can be easily fooled. Fortunately, for the time being at least, there are a few telltale signs that give these scams away including suspicious URLs and unsolicited attachments.
What is vishing?
Impersonating a person or legitimate business to scam people isn’t a new thing. Vishing is simply a new twist on an old routine. In fact, vishing has been around almost as long as internet phone service. The word ‘vishing’ is a combination of ‘voice’ and ‘phishing.’ Phishing is the practice of using deception to get you to reveal personal, sensitive, or confidential information. However, instead of using email, regular phone calls, or fake websites like phishers do, vishers use an internet telephone service (VoIP).
what is cyberstalking?
Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. A cyberstalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages.