Saturday, May 29, 2010

Will the real Slim Shady please stand up?

Phishing relies on a 1-2 combination of online trickery to get users to submit sensitive information (such as usernames, passwords, credit cards, or financial information). Phishing uses email or instant messaging to direct users to fake sites that mimic legitimate sites.

No comments:

Post a Comment