Today it has become common in the vocabulary of computers speaking the word “Phishing”, that is derived from “Fisher” which in Spanish means fisherman, then “Phishing” would be conceptually “Fishing”, I refer to speaking and which is a word derived from English. In general, the Phishing is a type of social engineering, ie a way to persuade or trick a person to obtain its objective identity theft. This concept is consistent, no single person performs all the functions within the process of identity theft because after performing this step comes the evil by which we must beware of Phishing, the phisher attack. Usually who steals the identity is not to benefit the wearer, who sells this then give use, so I referred to systematic, and that various elements are the process, identity theft first and then use the stolen information. There are a number of ways to steal your identity as a person electronic, but in this article show the most used and how to avoid becoming a victim of a phisher. The most common phishing attacks and we will discuss in this chapter is by email, almost every day we are victims of this attack through our emails, send change passwords or personal data of some Web preferably known or commercial banks, some of the attacks to achieve their objectives because they are made by professionals. Additional information is available at Steven Holl.
To avoid being a victim have to take into account: Do not answer emails that invite us to change personal information. Check the links in the emails sent to us, that these coincide with the corresponding pages. Verify that the Web pages you visit are safe when dealing financial institutions or other recognized preferably, that is, they are: Do not clean and jerk by e-mail personal information and / or confidential. For more specific information, check out Legatum. Update each software on your PC, especially those related to security and navigation. Do not access their bank accounts from public places, eg. cyber cafe. Must always be alert to any e-mail, you may be or lead to a Phishing attack. Our ability to detect a phishing attack, practice: