Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Password Resets

    By
    Fahmida Y. Rashid
    -
    May 23, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Password Resets

      1

      Perhaps the most well-known type of phishing, the email claims something is wrong with the user account and asks that the user log in to reset or secure the account. This may be a link to a page or an attached HTML file.

      2That Enticing Ad

      2

      Perhaps its a free iPad, or you won free airplane tickets because Osama bin Laden is dead. Or the ad is for an online multiplayer game everyone has been talking about. Malvertisements, or advertisements that link to malicious sites, are a growing problem and can trick users into going to phishing sites while surfing on legitimate pages.

      3The All-Important Work File

      3

      These are commonly seen in large organizations where no one is familiar with all the managers or employees. This scam pretends to be an internal message with a relevant attachment. It can be a new template for expense reports, or an updated organization chart. The latest PDF exploits successfully used this scam to download data-stealing malware onto the users machines.

      4Wanted: A Job

      4

      Attackers can respond to a job posting on any of the legitimate boards and attach a document or include a link under the pretext of applying for a job. No HR person would think twice about clicking on the link or opening an attachment loaded with data-stealing malware, such as a keylogger.

      5LinkedIn Requests

      5

      Heres a good example of how attackers select victims to spear-phish. Based on the job title or company name, attackers identify the pool of people to send a fake LinkedIn request. When the user clicks on the link, they are directed to a fake LinkedIn page and asked to log in. Dont accept LinkedIn requests by clicking on the link; go to the site manually.

      6Fake Auctions

      6

      Attackers can put up a fake auction on eBay and other legitimate sites. Users looking for a deal find the auction listing and click on the link purporting to have more details—an image of the sale item, for example. When they are redirected to the malicious portal, data-stealing malware is downloaded onto the computer.

      7Help! I am Stranded!

      7

      Someone has been robbed while in Spain, London, somewhere, for a visit. No money, no passport. Please wire money, they say. Even if its your favorite Uncle Andy, dont click on the link. Uncle Andy can call collect and ask for help. (Or call Aunt Bea to make sure Uncle Andy is in Spain in the first place.)

      8Nigerian Scam

      8

      While derided for its poor grammar and unbelievable claims of untold wealth, these scams are around precisely because people still fall for them. Purporting to be from a well-connected person in Nigeria, China, North Korea, Libya, etc., trying to move money out of the country, the user is offered a cut of the money for providing a bank account to help transfer the funds. Even more unbelievable is that people will foolishly send the number for an active savings or checking account that contains their personal funds. When they do, the scammers will clean out the account and leave behind shattered dreams of wealth.

      9The Unexpected Bequest

      9

      A variation of the trying to get my money out of the country scam, this version claims someone who was a great philanthropist has died and decided to leave all the money to charity. If the news of an inheritance shows up in the in-box, odds are its a scam. Lawyers are more likely to rely on the United States Postal Service.

      10Not Quite the Right URL

      10

      While not as common, the trick of setting up a fake phishing site at a URL that looks similar to the real one is still around. Most are not as blatant as the infamous wwwbankofamerica.com site from 2003, and just have the site name Chase embedded in the name somewhere. Then there is the fake SB Capital site, with the URL that looks very legitimate.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×