Ecole Nationale des Sciences Appliquées – Safi
2012 – RefreshMyMind.Com
What’s Phishing ?1
How to protect yourself ?2
Phishing procedure3
Phishing examples4
 A criminal activity using social
engineering techniques (a
collection of techniques used to
manipulate people into
performing actions or divulging
confidential information).
 Phishers attempt to fraudulently
acquire sensitive information,
such as usernames, passwords
and credit card details, by
masquerading as a trustworthy
entity in an electronic
communication.
 It often involves receiving an email from a
trusted company, such as eBay, PayPal, the
government or your bank.
 This email may list unauthorized charges,
shipments or bills
RefreshMyMind.Com
Often phishers will use your name, address and phone
number to make their correspondence appear legitimate.
The attackers can get your information from the following
sources:
 Unfortunately, many companies will sell your private
information.
 Private data can be stolen by hackers
1
Contacting
the company,
for subject of
the email
3
Verifying
information in
the email
2
Bypassing
the link of the
suspected
phishing
message
4
Using SPAM
filters
6
Implementing
some
extensions to
the browser
5
Implementing
Anti-phishing
measures to
browsers
Step 1 Step 2 Step 3
Scams Mailing-Lists Phishing e-mails
Internet Phishing�
Internet Phishing�
RefreshMyMind.Com
Internet Phishing�
Phisher has used an image to make it harder for anti-phishing filters to detect by
scanning for text commonly used in phishing emails.
Internet Phishing�
Internet Phishing�
Internet Phishing�
RefreshMyMind.Com

More Related Content

PPTX
Phishing
PPTX
Phishing
PPT
Phishing
PPTX
Phishing
PPTX
PHISHING PROJECT REPORT
PPTX
Phishing
PPT
PPTX
Phishing--The Entire Story of a Dark World
Phishing
Phishing
Phishing
Phishing
PHISHING PROJECT REPORT
Phishing
Phishing--The Entire Story of a Dark World

What's hot (20)

PPT
Phishing
PPTX
Phishing
PPTX
Phishing
PPT
Phishing & Pharming
ODP
phishing and pharming - evil twins
PPTX
The Difference between Pharming and Phishing
PPTX
Phishing technology
PPT
ICT-phishing
PPT
Phishing
PPT
P H I S H I N G
PPTX
What is Phishing and How can you Avoid it?
PPTX
Anti phishing
PPT
Ict Phishing (Present)
PPTX
Phishing techniques
PPT
The Phishing Ecosystem
PPT
Phishing attacks ppt
PPT
P H I S H I N G
PPT
Phishing: Swiming with the sharks
PPT
Intro phishing
Phishing
Phishing
Phishing
Phishing & Pharming
phishing and pharming - evil twins
The Difference between Pharming and Phishing
Phishing technology
ICT-phishing
Phishing
P H I S H I N G
What is Phishing and How can you Avoid it?
Anti phishing
Ict Phishing (Present)
Phishing techniques
The Phishing Ecosystem
Phishing attacks ppt
P H I S H I N G
Phishing: Swiming with the sharks
Intro phishing
Ad

Viewers also liked (20)

PPTX
Excel Presentation
PPTX
Excel
PPT
Internet Phishing
PPTX
Digital etiquette
PPTX
Digital Etiquette
PPTX
Our Solutions To the Problems with Guided Reading
PPT
Digital Etiquette
KEY
Cyber safety & Social Media - Penguin 2012
PPTX
Problem solving reading and writing classes
PPTX
Digital Etiquette
PPTX
What Is Digital Etiquette
PPTX
Microsoft excel
PDF
Language learning difficulty or a disability
PPTX
PPTX
Developmental Reading
PPTX
Theories in reading instruction report
PPTX
Problem Solving
PPTX
Dysgraphia Speech Therapy
PPTX
THEORIES OF READING PROCESS
PPT
Dysgraphia
Excel Presentation
Excel
Internet Phishing
Digital etiquette
Digital Etiquette
Our Solutions To the Problems with Guided Reading
Digital Etiquette
Cyber safety & Social Media - Penguin 2012
Problem solving reading and writing classes
Digital Etiquette
What Is Digital Etiquette
Microsoft excel
Language learning difficulty or a disability
Developmental Reading
Theories in reading instruction report
Problem Solving
Dysgraphia Speech Therapy
THEORIES OF READING PROCESS
Dysgraphia
Ad

Similar to Internet Phishing (20)

DOCX
How to Identify and Avoid Phishing Scams
PPTX
IS Presetation.pptx
PPTX
Phishing technology
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PPTX
Phishing technology
PDF
A Deep Dive into Phishing Techniques and Countermeasures.pdf
PPTX
Blue and White Minimal Professional Business Project Presentation .pptx
PDF
Unmasking the Scammers. pdf by Mathias. O.O
PPTX
December 2019 Part 10
DOCX
Identity theft in the internet
PDF
Understanding Phishing Malpractices in the Technology Sector and Their Ongoin...
PPTX
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
PDF
Phishing vs Vishing Protecting Yourself from Cyber Threats-Ebook
PPT
Pp8
PDF
Identity Theft: Evolving with Technology
PPT
Identity Theft: How to Avoid It
PDF
IT Sample Paper
PDF
Types Of Smishing Attack – Signs And Prevention
PPT
Phising
PPTX
Phishing 1 vp
How to Identify and Avoid Phishing Scams
IS Presetation.pptx
Phishing technology
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Phishing technology
A Deep Dive into Phishing Techniques and Countermeasures.pdf
Blue and White Minimal Professional Business Project Presentation .pptx
Unmasking the Scammers. pdf by Mathias. O.O
December 2019 Part 10
Identity theft in the internet
Understanding Phishing Malpractices in the Technology Sector and Their Ongoin...
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
Phishing vs Vishing Protecting Yourself from Cyber Threats-Ebook
Pp8
Identity Theft: Evolving with Technology
Identity Theft: How to Avoid It
IT Sample Paper
Types Of Smishing Attack – Signs And Prevention
Phising
Phishing 1 vp

Recently uploaded (20)

PPTX
Slides World Games Great Redesign Eco Economic Epochs.pptx
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
Introduction to networking local area networking
PDF
Paper: World Game (s) Great Redesign.pdf
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Slides World Games Great Redesign Eco Economic Epochs.pdf
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
Going_to_Greece presentation Greek mythology
PPTX
Networking2-LECTURE2 this is our lessons
PPTX
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
PDF
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
DOCX
Audio to Video AI Technology Revolutiona
PDF
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
PPTX
Introduction: Living in the IT ERA.pptx
Slides World Games Great Redesign Eco Economic Epochs.pptx
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Introduction to networking local area networking
Paper: World Game (s) Great Redesign.pdf
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Slides World Games Great Redesign Eco Economic Epochs.pdf
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
Digital Project Mastery using Autodesk Docs Workshops
Basic_of_Computer_System.pptx class-8 com
PORTFOLIO SAMPLE…….………………………………. …pptx
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Going_to_Greece presentation Greek mythology
Networking2-LECTURE2 this is our lessons
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
AI AppSec Threats and Defenses 20250822.ppsx
Audio to Video AI Technology Revolutiona
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
Introduction: Living in the IT ERA.pptx

Internet Phishing

  • 1. Ecole Nationale des Sciences Appliquées – Safi 2012 – RefreshMyMind.Com
  • 2. What’s Phishing ?1 How to protect yourself ?2 Phishing procedure3 Phishing examples4
  • 3.  A criminal activity using social engineering techniques (a collection of techniques used to manipulate people into performing actions or divulging confidential information).  Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
  • 4.  It often involves receiving an email from a trusted company, such as eBay, PayPal, the government or your bank.  This email may list unauthorized charges, shipments or bills RefreshMyMind.Com
  • 5. Often phishers will use your name, address and phone number to make their correspondence appear legitimate. The attackers can get your information from the following sources:  Unfortunately, many companies will sell your private information.  Private data can be stolen by hackers
  • 6. 1 Contacting the company, for subject of the email 3 Verifying information in the email 2 Bypassing the link of the suspected phishing message
  • 7. 4 Using SPAM filters 6 Implementing some extensions to the browser 5 Implementing Anti-phishing measures to browsers
  • 8. Step 1 Step 2 Step 3 Scams Mailing-Lists Phishing e-mails
  • 13. Phisher has used an image to make it harder for anti-phishing filters to detect by scanning for text commonly used in phishing emails.