<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5835433995417652629</atom:id><lastBuildDate>Sat, 07 Sep 2024 01:58:37 +0000</lastBuildDate><title>Phishing</title><description>Beware, phishing ain't fishing.</description><link>http://phishing1122.blogspot.com/</link><managingEditor>noreply@blogger.com (WONG sing yee)</managingEditor><generator>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Beware, phishing ain't fishing.</itunes:subtitle><itunes:category text="Education"/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-312064500271849304</guid><pubDate>Mon, 18 Apr 2011 05:57:00 +0000</pubDate><atom:updated>2011-04-18T13:57:50.353+08:00</atom:updated><title>phishing first podcast</title><description>&lt;object data="http://boos.audioboo.fm/swf/fullsize_player.swf" height="129" id="boo_embed_334511" type="application/x-shockwave-flash" width="400"&gt;&lt;param name="movie" value="http://boos.audioboo.fm/swf/fullsize_player.swf" /&gt;&lt;param name="scale" value="noscale" /&gt;&lt;param name="salign" value="lt" /&gt;&lt;param name="bgColor" value="#FFFFFF" /&gt;&lt;param name="allowScriptAccess" value="always" /&gt;&lt;param name="wmode" value="window" /&gt;&lt;param name="FlashVars" value="mp3=http%3A%2F%2Faudioboo.fm%2Fboos%2F334511-phishing1122.mp3%3Fsource%3Dembed&amp;amp;rootID=boo_embed_334511&amp;amp;mp3Title=Phishing1122&amp;amp;mp3LinkURL=http%3A%2F%2Faudioboo.fm%2Fboos%2F334511-phishing1122&amp;amp;mp3Time=05.56am+18+Apr+2011" /&gt;&lt;a href="http://audioboo.fm/boos/334511-phishing1122.mp3?source=embed"&gt;Listen!&lt;/a&gt;&lt;/object&gt;</description><link>http://phishing1122.blogspot.com/2011/04/phishing-first-podcast.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-8196355414713159910</guid><pubDate>Sun, 10 Apr 2011 07:04:00 +0000</pubDate><atom:updated>2011-04-10T15:28:05.540+08:00</atom:updated><title>Poll question of week 10</title><description>Link to us: &lt;a href="http://snipurl.com/week10poll"&gt;http://snipurl.com/week10poll&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://picasaweb.google.com/117610269602174604194/Apr102011#5593853154889197826"&gt;&lt;img border="0" height="253" r6="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge-CR9Fb1s_ikuYXwEb_ZuQNkfRfHyhRVQOg4-I3kc9reTicOi-9Sf1AeCk7CRRrIwEdNJ9ox4X-rHKjEGG7UnfKM7FfoUdAouSC32JXXb702ySFFiCMyJKweF1QekDaJlY9FiLsxRRIU/s320/week+10+result+poll.bmp" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Based of the result of the poll question, there is a total of&amp;nbsp;45 votes and 4 (8%) votes&amp;nbsp; the purpose of the phisher&amp;nbsp;is hacking for fun. Some of people think the phisher are bored people looking for amusement. The people think the phisher break in because they think somebody might have interesting data and they have nothing better to do. The phisher have a strong desire to know about how to phishing attack and they often damage the something through ignorance or in trying to cover their tracks.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;3 (6%) votes the purpose of the phisher is to do damage. A few of people think the phisher out to do damage, either because they get their kicks from destroying things. The phisher just want to damage something which makes it less attractive, useful or valuable. Only 2 (4%) votes the&amp;nbsp;phisher do not like somebody. Not many people think phisher are do not like somebody because they are anger somebody become a target to&amp;nbsp;phishing attack.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Most of people 22 (48%) votes &amp;nbsp;phisher break in because they are want information for other purpose. While these phisher are not above theft, they usually steal things that are directly convertible into money or further access such as credit card, telephone, or network access information. If they find secrets they think they can sell, they may try to do so, but that's not their main business. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14 (31%) votes the purpose of the phisher is prefer sites of particular interest.&amp;nbsp;A lot of people think phisher may prefer sites of particular interest. Breaking into something well-known, well-defended, or otherwise especially neat is usually worth more points to them. However, they will also attack anything they can get at; they are going for quantity as well as quality. They do not have to want anything you have got, or care in the least about the characteristics of your site. They may or may not do damage on the way through. They will certainly gather information and keep it for phishing attack.</description><link>http://phishing1122.blogspot.com/2011/04/poll-question-of-week-10.html</link><author>noreply@blogger.com (WONG sing yee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge-CR9Fb1s_ikuYXwEb_ZuQNkfRfHyhRVQOg4-I3kc9reTicOi-9Sf1AeCk7CRRrIwEdNJ9ox4X-rHKjEGG7UnfKM7FfoUdAouSC32JXXb702ySFFiCMyJKweF1QekDaJlY9FiLsxRRIU/s72-c/week+10+result+poll.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-3577842300563553902</guid><pubDate>Mon, 04 Apr 2011 13:09:00 +0000</pubDate><atom:updated>2011-04-04T21:09:35.900+08:00</atom:updated><title>Phishing Scams in Plain English</title><description>&lt;iframe width="480" height="295" src="http://www.youtube.com/embed/sqRZGhiHGxg?fs=1" frameborder="0" allowfullscreen=""&gt;&lt;/iframe&gt;</description><link>http://phishing1122.blogspot.com/2011/04/phishing-scams-in-plain-english.html</link><author>noreply@blogger.com (Marvin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/sqRZGhiHGxg/default.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-640504547364867342</guid><pubDate>Sun, 03 Apr 2011 11:27:00 +0000</pubDate><atom:updated>2011-04-14T14:11:58.039+08:00</atom:updated><title>Crossword Puzzle Winner</title><description>The winner of our crossword puzzle is Chew Wing Sheng from Inti College Subang Jaya, who is taking Diploma in Internet Communication Technology. Thank you for those who have joined this contest! The prize given was a stack of Double A A4 paper which was useful for doing assignments. Here we provide our readers the answers of our puzzle.&lt;br /&gt;&lt;br /&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWlWc5tdkPzxZRDIaSy05uGSOvp3Vtz0hrE4EOuOlyxXWs0MyhWJHiG9bOl9xV0GC7i9mWdupSxeQoyr_uZqmQUb-797UUGyU31g7GipkZgYQ5b4HSroptu31LzTYwp92QPVQGmJffEIY/s576/pz.jpg"/&gt;&lt;br /&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIkO3d9YobKMrVVqaN0VQ8SyS_dikXMUQeOwUNj_nugYJ_Qfcg-PvOMS11jFZq-YtTjXkrGkHX4mCRuxbYM7HXcbELNRyOEFeidZhBl2oaXZ6TxsVLA6SzemwN_7HvlaANc61NYHcrHVI/s576/ans.jpg"/&gt;</description><link>http://phishing1122.blogspot.com/2011/04/crossword-puzzle-winner.html</link><author>noreply@blogger.com (siew chin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWlWc5tdkPzxZRDIaSy05uGSOvp3Vtz0hrE4EOuOlyxXWs0MyhWJHiG9bOl9xV0GC7i9mWdupSxeQoyr_uZqmQUb-797UUGyU31g7GipkZgYQ5b4HSroptu31LzTYwp92QPVQGmJffEIY/s72-c/pz.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-8690902836263432358</guid><pubDate>Sat, 02 Apr 2011 11:32:00 +0000</pubDate><atom:updated>2011-04-02T19:44:56.413+08:00</atom:updated><title>Poll question of week 9</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Link to us: &lt;a href="http://snipurl.com/week9poll"&gt;http://snipurl.com/week9poll&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://picasaweb.google.com/117610269602174604194/Apr22011#5590949659983423394"&gt;&lt;img border="0" r6="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTBtWiJ037sYy9OEwN3R_aAFAp3uNKrK1_Z5Z2VqQzEwDmsn2KiTWY1BczqR7H2VCHkHMXg6SeZ3zxOsSB7HDGhh5HPFihLUvBKA5WvzNkqq8avOYQq4PhlRQSgCXfyZnQWVSwYDL5pEI/s1600/week+9+result.bmp" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Based of the result of the poll question, there is a total of 23 votes and 4 votes (17%)&amp;nbsp; can be able to recognize phishing attack because they have been familiar with a phisher behavior, seen, heard or personal experience about phishing attack. The few of people&amp;nbsp;have information in their mind as a result of experience about phishing attack because they have learned or been told it. &lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The most of people&amp;nbsp;10 (43%) votes maybe can avoid form phishing attack.&amp;nbsp;They&amp;nbsp;are not certain that phishing attack will be happen or not confidence they can avoid from phishing attack.7 (30%) votes don't known can&amp;nbsp;&amp;nbsp;avoid from phisher or not. A lot of people do not know about what is phishing and do not understand how the phisher hacked. They may also do not heard about phishing attack before.&amp;nbsp; &lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Only 2 (8%) votes cannot&amp;nbsp;prevent from phishing attack. Not many people think they can not to realize or be aware the phishing attack. The reason they choose can be easily fooled by a phisher because they are may first time uses the internet or cannot understand how to prevent phishing attack. Another reason is they are very lazy to learn or read matter about phishing attack and also lazy to find information on the latest tactics fraud on the internet.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;According the poll question, phishing scams are now a part of everyday life. It’s important that you know how to spot one and avoid becoming a victim. Anyone can be tricked by a phishing scam. Simple phishing scams are easy to spot, but the best scammers are actually pretty smart. They use a variety of tricks to make the phishing scam look like a legitimate process. &lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;﻿&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/04/poll-question-of-week-9.html</link><author>noreply@blogger.com (WONG sing yee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTBtWiJ037sYy9OEwN3R_aAFAp3uNKrK1_Z5Z2VqQzEwDmsn2KiTWY1BczqR7H2VCHkHMXg6SeZ3zxOsSB7HDGhh5HPFihLUvBKA5WvzNkqq8avOYQq4PhlRQSgCXfyZnQWVSwYDL5pEI/s72-c/week+9+result.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-3795938459222463268</guid><pubDate>Sun, 27 Mar 2011 08:14:00 +0000</pubDate><atom:updated>2011-04-02T19:43:08.999+08:00</atom:updated><title>Poll question of week 8</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Link to us:&lt;a href="http://snipurl.com/week8poll"&gt; http://snipurl.com/week8poll&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="https://picasaweb.google.com/117610269602174604194/Apr2201102#5590950254415080546"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia1N6I0fKgoWZeIIlxCY1B4bctlA8GEAL-WT-e9_3NOjEvkc7MKH9Tb164uIbK5sBuRBXom2FMvBangdINLaP4delk1sOqtzgmB9-gsDOEoDc6qXJD0TRwoGy_gfVJFBWUvmwHLcRwT7c/s1600/result+question+8.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Based of the result of the poll question, there is a total of 31 votes and 21(67%) votes Japan earthquake and tsunami is serious problem for phishing scam. 9(29%) votes may will be Japan earthquake and tsunami for phishing scam. Only 1(3%) vote Japan earthquake and tsunami will not effect by phishing scam. The result show that a lot of people know that disaster will affect victims for phishing scam, but some of people do not&amp;nbsp;think&amp;nbsp;that disaster will afffect victims from phishing scam and they don't think that should be worry. &lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/03/poll-question-of-week-8.html</link><author>noreply@blogger.com (WONG sing yee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia1N6I0fKgoWZeIIlxCY1B4bctlA8GEAL-WT-e9_3NOjEvkc7MKH9Tb164uIbK5sBuRBXom2FMvBangdINLaP4delk1sOqtzgmB9-gsDOEoDc6qXJD0TRwoGy_gfVJFBWUvmwHLcRwT7c/s72-c/result+question+8.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-9216325671477110355</guid><pubDate>Sun, 27 Mar 2011 02:16:00 +0000</pubDate><atom:updated>2011-03-27T10:17:34.022+08:00</atom:updated><title>Phishing Contest</title><description>&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); font-size: small; "&gt;&lt;h1 style="display: block; line-height: 28px; font-size: 26px; margin-top: 0px; margin-right: 0px; margin-bottom: 0.8em; margin-left: 0px; "&gt;Phishing Contest !!&lt;/h1&gt;&lt;div id="previewbody" style="font-size: 17px; color: rgb(102, 102, 102); margin-left: 0.2em; display: block; "&gt;Please download our contest here !! ----&gt;&gt;&gt; &lt;a href="http://www.mediafire.com/?a4xkz922u72eijm" style="font-weight: bold; color: rgb(51, 102, 204); "&gt;CROSSWORD PUZZLE CONTEST&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="border-collapse: collapse; color: rgb(51, 51, 51); font-family: 'trebuchet ms', verdana, arial, sans-serif; font-size: 13px; line-height: 18px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "&gt;Please send an e-mail the complete puzzle with your information stated below to &lt;a href="mailto:siewchin.92@gmail.com" style="font-weight: bold; color: rgb(51, 102, 204); "&gt;siewchin.92@gmail.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Name:&lt;br /&gt;Age:&lt;br /&gt;Gender:&lt;br /&gt;Email address:&lt;br /&gt;&lt;br /&gt;Rule:&lt;br /&gt;1.Your information submitted must be truth.&lt;br /&gt;2.We have the capability to cancel your qualifications, if found any cheater.&lt;br /&gt;3.No copy from your friend.&lt;br /&gt;4.Must be Malaysian.&lt;br /&gt;5.Pass up before the deadline.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;</description><link>http://phishing1122.blogspot.com/2011/03/phishing-contest_27.html</link><author>noreply@blogger.com (siew chin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-1055427390350165780</guid><pubDate>Thu, 24 Mar 2011 12:04:00 +0000</pubDate><atom:updated>2011-03-26T11:45:40.966+08:00</atom:updated><title>Japan Earthquake Scam ?</title><description>&lt;span class="Apple-style-span" style="line-height: 12px; font-family: Arial, Helvetica, sans-serif; "&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;Link to us: &lt;a href="http://snipurl.com/japanearthquakescam"&gt;http://snipurl.com/japanearthquakescam&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;Scammers and hackers are using the devastating earthquake and tsunami in Japan to appeal for fraudulent charity donations. US-CERT, the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security (DHS), is warning users regarding fake antivirus and phishing attacks regarding the Japan earthquake and the tsunami disasters. Scammers are also flooding e-mail inboxes with messages asking recipients to donate money to relief efforts.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;In Facebook also scams are rocking, If you get a link to something like “Japanese Tsunami RAW Tidal Wave Footage’, don’t click it. It’s a scam. You may be tricked into “liking” the page and then taking a personal info harvesting survey, and then promoting the scam.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;Symantec has observed a classic 419 message targeting the Japanese disaster, said researcher Samir Patil in a post to the company’s security blog. “The message is a bogus ‘next of kin’ story that purports to settle millions of dollars owing to an earthquake and tsunami victim.” Hackers have also registered a large number of domains with URLs that may fool users into thinking that they’re legitimate donation or relief sites, said Patil, a tactic that can also push those sites higher on search results.&lt;/span&gt;&lt;/p&gt;&lt;h2 style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 15px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; letter-spacing: -1px; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;How to Protect yourself&lt;/span&gt;&lt;/h2&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;- Do not follow unsolicited web links or attachments in email messages.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;- Maintain up-to-date antivirus software.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;- Verify the legitimacy of the email by contacting the organization directly through a trusted contact number.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;- Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;- Take advantage of any anti-phishing features offered by your email client and web browser.&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 10px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; line-height: 1.5em; text-align: justify; "&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; outline-width: 0px; outline-style: initial; outline-color: initial; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; text-decoration: none; vertical-align: baseline; white-space: normal; "&gt;refference: &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, serif; line-height: normal; "&gt;&lt;a href="http://www.cybervally.com/2011/03/beware-fake-japan-earthquake-tsunami-disaster-email-scams-phishing-attacks/"&gt;http://www.cybervally.com/2011/03/beware-fake-japan-earthquake-tsunami-disaster-email-scams-phishing-attacks/&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://phishing1122.blogspot.com/2011/03/japan-earthquake-scam.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-5295636693120473170</guid><pubDate>Sun, 20 Mar 2011 06:39:00 +0000</pubDate><atom:updated>2011-03-24T11:32:18.285+08:00</atom:updated><title>Poll question of week 7</title><description>Link to us : &lt;a href="http://snipurl.com/week7poll"&gt;http://snipurl.com/week7poll&lt;/a&gt;&lt;br /&gt;
﻿﻿﻿ &lt;br /&gt;
﻿﻿﻿﻿﻿ &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://picasaweb.google.com/117610269602174604194/Mar242011#5587482672720177762"&gt;&lt;img border="0" height="254" r6="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS01xjWU__s27lqEVOsu5uHRdEogR7tpn_88TRHmlWAJbUOZk5uaUGB1Gb37KhbyZFAHiDcK3S4mosjwOHABHaZ-MkUcjv35VjoukQrZJe5eZIMZAbApTUt10iCj9nsC82VeH8eFEeRyY/s400/paypal+result.bmp" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;﻿﻿﻿﻿﻿ ﻿﻿﻿ Based on the result of the poll question, there is a total of 36 votes and 31(83%) votes the paypal phishing will affects customers online purchased. According the top 10 phishing websites in 2010, the paypal phishing is one&amp;nbsp; of the most popular in the word. Most of people think that victims may be to click on the link in the e-mail which leads the victims to a fake website; this is serious problem for customers online purchased. Only 6 (16%) votes the paypal phishing will not be affect customers online purchased. A few of people are think the people having a lot of experience of the world and knowing about phishing and they do not worry about it.</description><link>http://phishing1122.blogspot.com/2011/03/poll-question-of-week-7.html</link><author>noreply@blogger.com (WONG sing yee)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS01xjWU__s27lqEVOsu5uHRdEogR7tpn_88TRHmlWAJbUOZk5uaUGB1Gb37KhbyZFAHiDcK3S4mosjwOHABHaZ-MkUcjv35VjoukQrZJe5eZIMZAbApTUt10iCj9nsC82VeH8eFEeRyY/s72-c/paypal+result.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-4045200804197082291</guid><pubDate>Thu, 17 Mar 2011 06:36:00 +0000</pubDate><atom:updated>2011-03-20T15:15:40.985+08:00</atom:updated><title>Avoid Japan Earthquake Phishing</title><description>&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Link to us: &lt;a href="http://snipurl.com/avoidjapanphishing"&gt;http://snipurl.com/avoidjapanphishing&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="border-collapse: collapse; color: #333333; font-family: &amp;quot;trebuchet ms&amp;quot;,verdana,arial,sans-serif; line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="border-collapse: separate; color: black; font-family: Georgia,serif; line-height: normal;"&gt;Global online community is showing support by charities’ websites like Red Cross for the 8-9 magnitudes earthquake that hit Japan on 17 March 2011- friday. There are some ways to make sure your donation reaches the right people.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
1) &lt;span style="font-weight: bold;"&gt;Check for the URL spelling.&lt;/span&gt; Hackers are smart at making the fake URL looks real, for instance, credits.com for credit.com. This technique is called typosquatting.&lt;br /&gt;
2) &lt;span style="font-weight: bold;"&gt;Do not get misdirected.&lt;/span&gt; Online financial phishing scams will frequently direct you to a third party website that ask for your credit card information. If you’re being redirected to another site that does not look right, please disconnect from that website. Do not pay any attention to the link text because they can say anything. You have to pay more attention to the URL.&lt;br /&gt;
3) &lt;span style="font-weight: bold;"&gt;Avoid the social pressure.&lt;/span&gt; A scams usually works because it preys on a huge amount of people, please do some research if you see a website that appears syspicious. Never trust messages and links spread through Twitter.com and Facebook.com because they are hotbeds for scammers looking to mkake quick cash. Never give out your PIN code, driver's lisence number, phone number or date of birth because none of that information is required by legitimate sites like Red Cross.</description><link>http://phishing1122.blogspot.com/2011/03/avoid-japan-earthquake-phishing.html</link><author>noreply@blogger.com (siew chin)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-5629122053372826323</guid><pubDate>Mon, 14 Mar 2011 13:44:00 +0000</pubDate><atom:updated>2011-03-14T21:45:50.285+08:00</atom:updated><title>Announcement :: Crossword Puzzle coming out soon !</title><description>&lt;div&gt;&lt;span class="Apple-style-span" &gt;Link to us: &lt;a href="http://snipurl.com/crosswordpuzzle"&gt;http://snipurl.com/crosswordpuzzle&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;After a while our blog is up, we've decided to come up with a crossover puzzle for our readers to play with ! This activity will make the readers understand more about phishing ! Prize will be given !!&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="Apple-style-span"&gt;Rules of Competition&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;- Must be a Malaysian&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;-Must be our Blog's follower&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;-Must submit real information&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;Prize: Mystery Gift will be Given to the winner !!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 20px; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 20px; "&gt;Please complete the below information and send an email to us if u wish to join the competition!&lt;br /&gt;&lt;br /&gt;Name:&lt;br /&gt;Gender:&lt;br /&gt;Age:&lt;br /&gt;Email Address:&lt;br /&gt;Current Location:&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 20px; "&gt;Contact number:&lt;/span&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/03/announcement-crossword-puzzle-coming_14.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-3565378658721198733</guid><pubDate>Mon, 14 Mar 2011 04:18:00 +0000</pubDate><atom:updated>2011-03-14T12:22:28.990+08:00</atom:updated><title>Poll Week 6</title><description>&lt;span class="Apple-style-span"&gt;Link to us: &lt;a href="http://snipurl.com/week6poll"&gt;http://snipurl.com/week6poll&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;table style="text-align: left;width: auto; "&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: left;"&gt;&lt;a href="https://picasaweb.google.com/lh/photo/f9N9z_e8ZX-jySaRIsO0iQ?feat=embedwebsite"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZNI3GhtcRhmVZVNUXdGVjEqyViyZ_IbNFotsjgxP6JdEMRIwi9cfKcVO-x_AKLa5hY6x6J6GOPa6MaGfe3tPHEIjbNY7C0ALQq_9kTbawmDQVZio9dX3Zk6lLUyIJYYcP6gJJERUts48/s400/poll%20week%207.jpg" height="299" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="text-align: left; font-family: arial, sans-serif; "&gt;&lt;br /&gt;Poll question week seven:" Where Do You Think Our Blog's Standard Stand ?"&lt;br /&gt;There is a total of 27 votes and 1(3%) of them voted our blog's standard is poor and 3 (11%) of them voted the standard as Just nice and 23 (85%) voted Our blog's standard stand at Good !!&lt;br /&gt;None of the readers think our blog is noob .&lt;br /&gt;Thanks to those who voted for our blog, now we know where our standards stand and there'll be a contest coming up ! stay tuned !&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://phishing1122.blogspot.com/2011/03/poll-week-6.html</link><author>noreply@blogger.com (Marvin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZNI3GhtcRhmVZVNUXdGVjEqyViyZ_IbNFotsjgxP6JdEMRIwi9cfKcVO-x_AKLa5hY6x6J6GOPa6MaGfe3tPHEIjbNY7C0ALQq_9kTbawmDQVZio9dX3Zk6lLUyIJYYcP6gJJERUts48/s72-c/poll%20week%207.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-9067487706413567805</guid><pubDate>Sat, 12 Mar 2011 05:37:00 +0000</pubDate><atom:updated>2011-03-12T13:44:12.867+08:00</atom:updated><title>Phone Phishing</title><description>Link to us: &lt;a href="http://snipurl.com/phonephish"&gt;http://snipurl.com/phonephish&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;There is another type of phishing - phone phishing. This happens when someone pretending to be from a government agency or company, trying to ask for your personal information. It sounds easy to avoid, but unfortunately these people only need a few victims to fall for the scam to make it profitable.&lt;br /&gt;Phone phishing is increasing. Sometimes it seems like your bank is really calling you. Phone phisher can assume your identity and empty your bank accounts. Here are some things you need to remember when conducting sensitive financial transactions over the phone:&lt;br /&gt;&lt;br /&gt;1) &lt;span style="font-weight:bold;"&gt;Never give out full account numbers.&lt;/span&gt; Your financial institution doesn't need account numbers to verify your identity, if it is really necessary, give last four digits only, or insist on other methods to verify your identity, such as your date of birth.&lt;br /&gt;2) &lt;span style="font-weight:bold;"&gt;Do not call a number left in a recording.&lt;/span&gt; Instead, you should call the known customer service for your bank. Although you may need to go through a couple of transfer, at least it is safer.&lt;br /&gt;3) &lt;span style="font-weight:bold;"&gt;Be aware of repeated recordings&lt;/span&gt; to get a hold of you about important account or personal information. The bank is likely to use a real person to call you if there is really a problem.&lt;br /&gt;4) &lt;span style="font-weight:bold;"&gt;Do not trust caller ID &lt;/span&gt;because it can be spoofed. It is important to find out the exactly spelling and words that should appear on caller ID from your bank's customer service number.&lt;br /&gt;&lt;br /&gt;Have you been a victim of phone phishing?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Reference:&lt;br /&gt;1)All Business [Online], Retrieved 11 March 2011&lt;br /&gt;URL: &lt;a href="http://www.allbusiness.com/crime-law-enforcement-corrections/criminal-offenses/14808871-1.html"&gt;http://www.allbusiness.com/crime-law-enforcement-corrections/criminal-offenses/14808871-1.html&lt;/a&gt;&lt;br /&gt;2)Internet Fraud Tips [Online], Retrieved 11 March 2011&lt;br /&gt;URL: &lt;a href="http://www.fraud.org/tips/internet/phishing.htm"&gt;http://www.fraud.org/tips/internet/phishing.htm&lt;/a&gt;</description><link>http://phishing1122.blogspot.com/2011/03/phone-phishing.html</link><author>noreply@blogger.com (siew chin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-4200383602213104281</guid><pubDate>Mon, 07 Mar 2011 12:02:00 +0000</pubDate><atom:updated>2011-03-13T12:58:21.874+08:00</atom:updated><title>Poll week 5</title><description>&lt;span class="Apple-style-span"&gt;Link to us: &lt;a href="http://snipurl.com/week5poll"&gt;http://snipurl.com/week5poll&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table style="text-align: left; width: auto;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://picasaweb.google.com/lh/photo/dQGUkhODEuPg7qNLUv7ohA?feat=embedwebsite"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz0J3GdncIXgIUEWevI_nSV4jF1ueTAFMm_EO5Sujwa_ECLJGigG-2vCqtKdpONeH4Izh7CrO8RGtVYZEzzXyF1TPZ9XGQP3bhePGQIl1RQdSuCISqf43vvNkxn0DYQgbDWwXE03JJVpQ/s400/poll%20week%206.jpg" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td style="text-align: right;"&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="font-size: 11px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;Poll question week six :"Do you like our slogan ? Beware!! Phishing ain't fishing". There is a totalof 42 vote, 39 which is 92% of them voted yes and 4 which is 9% of them voted of no,means they don't like the slogan. Majority like the slogan and we are very happy that they like the slogan.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="font-size: 11px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="font-size: 11px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/03/blog-post.html</link><author>noreply@blogger.com (Marvin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiz0J3GdncIXgIUEWevI_nSV4jF1ueTAFMm_EO5Sujwa_ECLJGigG-2vCqtKdpONeH4Izh7CrO8RGtVYZEzzXyF1TPZ9XGQP3bhePGQIl1RQdSuCISqf43vvNkxn0DYQgbDWwXE03JJVpQ/s72-c/poll%20week%206.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-8688673387758344431</guid><pubDate>Fri, 04 Mar 2011 01:36:00 +0000</pubDate><atom:updated>2011-04-14T14:13:11.106+08:00</atom:updated><title>Top 10 Phishing Website in 2010.</title><description>Link to us: &lt;a href="http://snipurl.com/toptenphished"&gt;http://snipurl.com/toptenphished&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img border="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5R2m1aKo8rUvcLEjcAKktMQyl5cDctotYSVpA-Ih6dzeERGFb7Fd3cXXTFJC6Emd4SvlBRarFm1JJld1X-kHIdeG9NOjQV03fWkD91lBcxsR2kN2IE20h7flmriTTv_DxsLxQPgjZKy0/" alt="TopTenPhished" /&gt;&lt;br /&gt;&lt;br /&gt;1. PayPal — 45.9%1.&lt;br /&gt;2. Facebook — 5.3%2.&lt;br /&gt;3. HSBC Group — 4.1%3.&lt;br /&gt;4. World of Warcraft — 3.2%4.&lt;br /&gt;5. Internal Revenue Service — 3%5.&lt;br /&gt;6. Bradesco — 1.9%6.&lt;br /&gt;7. Orkut — 1.7%7.&lt;br /&gt;8. Sulake Corporation — 1.5 %8.&lt;br /&gt;9. Steam — 1.2%9.&lt;br /&gt;10. Tibia — 1%10.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;In OpenDNS annual report for 2010, the most frequently phished website in every month of 2010 was Paypal, which is 9 times more than the second popular phisher target, Facebook (5.3% fake sites). Five of the top ten phished website (Facebook, World of Warcraft, Sulake Corporation, Steam and Tibia are associated with social and online games.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;br /&gt;References&lt;br /&gt;Help Net Security [Online], Retrieved on 10 March 2011.&lt;br /&gt;URL: &lt;a href="http://www.net-security.org/secworld.php?id=10487"&gt;http://www.net-security.org/secworld.php?id=10487&lt;/a&gt;&lt;/p&gt;</description><link>http://phishing1122.blogspot.com/2011/03/top-10-phishing-website-in-2010.html</link><author>noreply@blogger.com (siew chin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5R2m1aKo8rUvcLEjcAKktMQyl5cDctotYSVpA-Ih6dzeERGFb7Fd3cXXTFJC6Emd4SvlBRarFm1JJld1X-kHIdeG9NOjQV03fWkD91lBcxsR2kN2IE20h7flmriTTv_DxsLxQPgjZKy0/s72-c" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-478801476655651120</guid><pubDate>Thu, 03 Mar 2011 05:12:00 +0000</pubDate><atom:updated>2011-03-03T22:56:55.005+08:00</atom:updated><title>New phishing technique exploits browser tab use</title><description>&lt;span style="font-family: 'Times New Roman','serif';"&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;Link to us: &lt;a href="http://snipurl.com/tabnabbing"&gt;http://snipurl.com/tabnabbing&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;/span&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"&gt;&lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;According the SC magazine a leading Firefox developer has discovered a new phishing attack method. This new phishing attack called tabnabbing. Tabnabbing means the users generally do not keep track of all the tabs they have opened at one time on browser tabs. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;span style="mso-tab-count: 1;"&gt;            &lt;/span&gt;Tabnabbing allow the attacker to implicitly change the contents of a separately tabbed page, name and logo when a user eventually returns to the tab such as Gmail and Facebook. In this new phishing attack, a user might to be tricked into visiting a maliciously crafted tabbed page including JavaScript. The victims may not expect is that a page they have been looking at will change behind the victims’ backs, when they are not looking. Phisher will catch them by surprise. &lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;span style="mso-tab-count: 1;"&gt;            &lt;/span&gt;Besides this, an attacker could make the phishing ruse even more clever and skilful by tricking somebody that takes advantages of a user’s web browsing history file. Attacker also is able to display a message that the user’s session has timed out, thereby adding legitimacy to the attack. &lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;span style="mso-tab-count: 1;"&gt;            &lt;/span&gt;Furthermore, users should check the URL of a site carefully if an unexpected login any webmail, bank or online commerce site page screen appears because there is no way to indicate that the page has changed. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;span style="mso-tab-count: 1;"&gt;            &lt;/span&gt;Last but not least, users can consider running the NoScript add-on for Mozilla Firefox or they can deploy a password management tool, which should not make saved logins available for use at malicious sites.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 10pt;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif';"&gt;&lt;u&gt;References&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif';"&gt;Angela Moscaritolo, SC magazine [Online], Retrieved on 3 March 2011.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif';"&gt;URL: &lt;a href="http://www.scmagazineus.com/new-phishing-technique-exploits-browser-tab-use/article/170983/#"&gt;http://www.scmagazineus.com/new-phishing-technique-exploits-browser-tab-use/article/170983/#&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/03/new-phishing-technique-exploits-browser.html</link><author>noreply@blogger.com (WONG sing yee)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-7712344036130323062</guid><pubDate>Mon, 28 Feb 2011 08:05:00 +0000</pubDate><atom:updated>2011-04-13T15:29:11.971+08:00</atom:updated><title>Poll question week 4</title><description>Link to us: &lt;a href="http://snipurl.com/weekfour"&gt;http://snipurl.com/weekfour&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;img title="This is the week 4 poll result" alt="This is the week 4 poll result" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0duprxez_dUP2fKVeiN3brTPriiso0wx1XjF_o_KALR8c3UyTNuXcCtU23M71cn3dponUUOKh5_rxtQt1k9Ww2arZpM7UoC_4bMcqEYDHd0220fYDLdSLQdsSPqMDna3_Toam2I-2ZbQ/" border="1" /&gt; &lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Poll question week four: Did you check your URL everytime when you access to website?There is a total of 12 votes, 8 of them voted "Yes", 4 of them voted "Sometimess", and none of them voted "No". The poll make us know that majority of them beware of phishing. To avoid be the victim of phishers, we should always check the URL of the website you accessing.</description><link>http://phishing1122.blogspot.com/2011/02/poll-question-week-four-did-you-check.html</link><author>noreply@blogger.com (siew chin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0duprxez_dUP2fKVeiN3brTPriiso0wx1XjF_o_KALR8c3UyTNuXcCtU23M71cn3dponUUOKh5_rxtQt1k9Ww2arZpM7UoC_4bMcqEYDHd0220fYDLdSLQdsSPqMDna3_Toam2I-2ZbQ/s72-c" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-7371504411862004990</guid><pubDate>Sat, 26 Feb 2011 16:05:00 +0000</pubDate><atom:updated>2011-03-02T00:22:42.084+08:00</atom:updated><title>Type of Phishing Attack</title><description>&lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Link to us: &lt;/span&gt;&lt;a href="http://snipurl.com/typeofphishingattack"&gt;http://snipurl.com/typeofphishingattack&lt;/a&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Deceptive Phishing. The term "phishing" originally referred to account theft using instant messaging but the most common broadcast method today is a deceptive email message. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confidential information can be collected.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Malware-Based Phishing refers to scams that involve running malicious software on users' PCs. Malware can be introduced as an email attachment, as a downloadable file from a web site, or by exploiting known security vulnerabilities--a particular issue for small and medium businesses (SMBs) who are not always able to keep their software applications up to date.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Keyloggers and Screenloggers are particular varieties of malware that track keyboard input and send relevant information to the hacker via the Internet. They can embed themselves into users' browsers as small utility programs known as helper objects that run automatically when the browser is started as well as into system files as device drivers or screen monitors.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Session Hijacking describes an attack where users' activities are monitored until they sign in to a target account or transaction and establish their bona fide credentials. At that point the malicious software takes over and can undertake unauthorized actions, such as transferring funds, without the user's knowledge.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Web Trojans pop up invisibly when users are attempting to log in. They collect the user's credentials locally and transmit them to the phisher.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Hosts File Poisoning. When a user types a URL to visit a website it must first be translated into an IP address before it's transmitted over the Internet. The majority of SMB users' PCs running a Microsoft Windows operating system first look up these "host names" in their "hosts" file before undertaking a Domain Name System (DNS) lookup. By "poisoning" the hosts file, hackers have a bogus address transmitted,taking the user unwittingly to a fake "look alike" website where their information can be stolen.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;System Reconfiguration Attacks modify settings on a user's PC for malicious purposes. For example: URLs in a favorites file might be modified to direct users to look alike websites. For example: a bank website URL may be changed from "bankofabc.com" to "bancofabc.com".&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Data Theft. Unsecured PCs often contain subsets of sensitive information stored elsewhere on secured servers. Certainly PCs are used to access such servers and can be more easily compromised. Data theft is a widely used approach to business espionage. By stealing confidential communications, design documents, legal opinions, employee related records, etc., thieves profit from selling to those who may want to embarrass or cause economic damage or to competitors.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;DNS-Based Phishing ("Pharming"). Pharming is the term given to hosts file modification or Domain Name System (DNS)-based phishing. With a pharming scheme, hackers tamper with a company's hosts files or domain name system so that requests for URLs or name service return a bogus address and subsequent communications are directed to a fake site. The result: users are unaware that the website where they are entering confidential information is controlled by hackers and is probably not even in the same country as the legitimate website.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Content-Injection Phishing describes the situation where hackers replace part of the content of a legitimate site with false content designed to mislead or misdirect the user into giving up their confidential information to the hacker. For example, hackers may insert malicious code to log user's credentials or an overlay which can secretly collect information and deliver it to the hacker's phishing server.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Man-in-the-Middle Phishing is harder to detect than many other forms of phishing. In these attacks hackers position themselves between the user and the legitimate website or system. They record the information being entered but continue to pass it on so that users' transactions are not affected. Later they can sell or use the information or credentials collected when the user is not active on the system.&lt;/span&gt;&lt;/p&gt;  &lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;Search Engine Phishing occurs when phishers create websites with attractive (often too attractive) sounding offers and have them indexed legitimately with search engines. Users find the sites in the normal course of searching for products or services and are fooled into giving up their information. For example, scammers have set up false banking sites offering lower credit costs or better interest rates than other banks. Victims who use these sites to save or make more from interest charges are encouraged to transfer existing accounts and deceived into giving up their details.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p class="MsoNormal"&gt;Reference : &lt;a href="http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html"&gt;http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html&lt;/a&gt; &lt;/p&gt;</description><link>http://phishing1122.blogspot.com/2011/02/type-of-phishing-attack.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-8849554737295906770</guid><pubDate>Thu, 24 Feb 2011 05:38:00 +0000</pubDate><atom:updated>2011-03-03T22:59:22.806+08:00</atom:updated><title>E-banking scams on the rise</title><description>&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman', serif; "&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Link to us: &lt;a href="http://snipurl.com/ebankingscam"&gt;http://snipurl.com/ebankingscam&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%; mso-fareast-font-family: 'Times New Roman';"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%; mso-fareast-font-family: 'Times New Roman';"&gt;According to the scams targeting electronic banking have increased of 1426 reports were made to CyberSecurity Malaysia last year compared with 634 in 2009. CyberSecurity Malaysia had identified at least 900 phishing sites targeting financial institutions in the country, it is easy to obtain personal information, usernames, passwords or credit card information through the phishing websites. The rise in Internet banking scams to the increasing popularity of the online banking among Malaysians. &lt;span style="mso-spacerun: yes;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Step by step to scams targeting electronic banking: -&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;1. Phishing was to despatch e-mails to account holders informing them of a “hitch” in their accounts, and that they should quickly log in to the account to verify some information. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;2. Victims may will be to click on the link in the e-mail which leads the victims to a fake website. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;3. The fake websites are used to mislead the victims log in by entering their usernames and passwords, which are immediately copied by the creator of the fake website.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;4. The cyber criminal can then log in and empty the victim entire account in minutes if the amount is within the limit allowed to be transferred in a day. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;References&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;E-banking scams on the rise , the star online,[Online],Retrieved on 17 February 2011.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;URL: &lt;a href="http://www.thestar.com.my/news/story.asp?sec=nation&amp;amp;file=/2011/2/16/nation/8071653"&gt;&lt;span style="color: purple;"&gt;http://www.thestar.com.my/news/story.asp?sec=nation&amp;amp;file=/2011/2/16/nation/8071653&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/02/e-banking-scams-on-th-rise.html</link><author>noreply@blogger.com (WONG sing yee)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-7557201495240600416</guid><pubDate>Fri, 18 Feb 2011 15:50:00 +0000</pubDate><atom:updated>2011-03-03T10:50:12.719+08:00</atom:updated><title>Spear Phishing Trial in Canada</title><description>&lt;div style="TEXT-ALIGN: justify"&gt;&lt;div class="MsoNormal" style="MARGIN-BOTTOM: 0pt; TEXT-ALIGN: justify"&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="LINE-HEIGHT: 24px; WHITE-SPACE: pre"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size:85%;"&gt;Link to us: &lt;a href="http://snipurl.com/spearphishing"&gt;http://snipurl.com/spearphishing&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style="TEXT-ALIGN: justify"&gt;What is spear phishing?&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;Firstly,I would like to explain something more about spear phishing. Spear phishing is an &lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;e-mail spoofing fraud attempt that targets a specific organization, seeking&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;unauthorized access to confidential data. As with the e-mail messages used in&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;regular phishing expeditions, spear phishing messages appear to come from a&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;trusted source. Phishing messages usually appear to come from a large and&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;well-known company or Web site with a broad membership base, such as eBay or&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;Pay Pal.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;In the case of spear phishing, however, the apparent source of the e-mail is&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;likely to be an individual within the recipient's own company and generally&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;someone in a position of authority. From what I've read somewhere, spear&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;phishing attempts are not from random hacker, they are more likely conducted by&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;sophisticated groups out for financial gain, trade secrets or military&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;information.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;In Toronto, computer hackers infiltrated some Canadian government computer systems&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;but were not able to access the classified data they were seeking. Stockwell Day,&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;the president of Treasury Board, which is also a federal administrative agency&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;said the attacks were significant but that Canada's cyber security systems&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;detected the intrusions and blocked them.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;TheCanadian Broadcasting Corporation reported computers belonging to the Treasury&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;Board and Finance Department were among the systems infiltrated in early&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;January, along with Defence Research and Development Canada, which is a&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;research agency within the Department of National Defence. No indications that&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;any data relating to Canadians was compromised.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;Prime Minister Stephen Harper said that federal security agencies were working to&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;deal with cyber threats. The CBC reported the cyber attacks were traced to&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;computer servers in China, but no government official would confirm the origins&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;of the attacks.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;span class="Apple-tab-span" style="WHITE-SPACE: pre"&gt;&lt;/span&gt;The report said hackers were using a technique known as spear phishing, which&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;involves impersonating bureaucrats via their e-mail accounts to snoop around&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;government computer systems and steal key passwords that unlock government data&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;systems.&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;Reference&lt;/div&gt;&lt;div style="TEXT-ALIGN: justify"&gt;http://biz.thestar.com.my/news/story.asp?file=/2011/2/18/business/20110218080041&amp;amp;sec=business&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/02/spear-phishing-trial-in-canada.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-78258225976929087</guid><pubDate>Thu, 17 Feb 2011 05:43:00 +0000</pubDate><atom:updated>2011-03-03T23:00:36.204+08:00</atom:updated><title>Search Engine Phishing</title><description>&lt;span style="font-family: 'Times New Roman', serif; "&gt;&lt;/span&gt;&lt;span class="Apple-style-span" &gt;Link to us: &lt;a href="http://snipurl.com/searchenginephishing"&gt;http://snipurl.com/searchenginephishing&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none; text-indent: 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;Search engine phisher refer to using powerful search engine to locate high-value targets or to search for valuable information. Phishers always try to create web pages for fake products, get the pages indexed by search engines, and wait for unsuspecting customers to enter their confidential information as part of an order, sign-up, or balance transfer. Such pages usually offer product or services at a price slightly too good to be true. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none; text-indent: 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;Phisher is a clever and dishonest plan for making money involving fraudulent banks have been particularly successful. A scam creates a page advertising an interest rate slightly higher than any real bank. For example, victims find the site of searching for products or services and use these sites to save or make from interest charges to transfer existing accounts; they are fooled into giving up their information to search engine phishing. Some victims even provided their bank account numbers to “Flintstone National Bank,” of “Bedrock, Colorado” of fraudulent banks.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none; text-indent: 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;The best way to prevent search engine phishing is should be very careful to notice any signs of danger when dealing with something because you think that there may be a problem site that has offers that seem just too good to be true.&lt;span style="mso-spacerun: yes;"&gt;  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: 150%; margin: 0in 0in 0pt; mso-layout-grid-align: none; mso-pagination: none; text-indent: 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt; line-height: 150%;"&gt;Google is known to have the cleanest design, fastest search results, and its unique Page Rank technology used by Internet users today. Google hacking involves using the Google search engine to locate specific strings of text within search engine. A web browser names as Mozilla Firefox plug-in website detections by leveraging the Google search engine. According to the Electrical and Computer Engineering Department, University of Toronto that search result of the unique keywords are then used to compare with the website that the users are currently visiting and to determine whether the website is a phishing website. Since most phishing sites are short-lived; they would have much less visitors compared to the legitimate sites they imitate. So it can be derived that the suspicious web site is unlikely to be the one that the users are expecting they are visiting when there is a mismatch in the domain result of the websites in the top search results and the suspicious web site. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;References&lt;br /&gt;1. Jessica Hunter, Search Engine Phishing-What you need to known, [Online], Retrieved on 16 February 2011.&lt;br /&gt;URL:&lt;span style="color: blue;"&gt; &lt;a href="http://www.identitytheftfixes.com/search_engine_phishing_--_what_you_need_to_know.html"&gt;http://www.identitytheftfixes.com/search_engine_phishing_--_what_you_need_to_know.html&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;2. Robert Ma, Phishing Attack Detection by Using a Reputable Search Engine, [Online], Electrical and Computer Engineering Department, University of Toronto, Retrieved on 17 February 2011.&lt;br /&gt;URL: &lt;span times="" new="" style="color: blue; font-family: '; font-size: 11pt; line-height: 115%;"&gt;&lt;a href="http://www.eecg.toronto.edu/~lie/Courses/ECE1776-2006/Projects/Phishing2a-proposal.pdf"&gt;http://www.eecg.toronto.edu/~lie/Courses/ECE1776-2006/Projects/Phishing2a-proposal.pdf&lt;/a&gt;&lt;/span&gt;</description><link>http://phishing1122.blogspot.com/2011/02/search-engine-phishing.html</link><author>noreply@blogger.com (WONG sing yee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-8757250291639455844</guid><pubDate>Mon, 14 Feb 2011 06:15:00 +0000</pubDate><atom:updated>2011-03-03T21:39:27.086+08:00</atom:updated><title>What is Phishing ?</title><description>&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(34, 34, 34); line-height: 21px; "  &gt;Link to us:&lt;a href="http://snipurl.com/whatisphishing"&gt;http://snipurl.com/whatisphishing&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #222222; font-family: 宋体; font-size: 14px; line-height: 21px;"&gt;什么是“网络钓鱼”？&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="hps" title="Click for alternate translations"&gt;&lt;span class="Apple-style-span" style="font-size: 14px; line-height: 21px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;(What is phishing ?)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;网络钓鱼是通过大量发送声称来自于银行或其他知名机构的欺骗性垃圾邮件，意图引诱收信人给出敏感信息（如用户名、口令、帐号 ID 、ATM PIN 码或信用卡详细信息）&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Phishing is sent through a large number of something claim to be from banks or other reputable organizations deceptive spam, intended to give sensitive information to lure the recipient such as user name, password, account ID, ATM PIN code or credit card details.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;最典型的网络钓鱼攻击将收信人引诱到一个通过精心设计与目标组织的网站非常相似的钓鱼网站上，并获取收信人在此网站上输入的个人敏感信息，通常这个攻击过程不会让受害者警觉。&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The most typical phishing attack to lure the recipient to a target organization through well-designed/perfectly designed sites with very similar phishing site, and collect whatever sensitive personal information the recipients insert, usually the process will not alert the Victim.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;这些个人信息对黑客们具有非常大的吸引力，因为这些信息使得他们可以假冒受害者进行欺诈性金融交易，从而获得经济利益。&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Those information collected is very attractive for hacker, because the information collected allow hackers to act as the victims and to cheat in financial transaction to gain economy benefits.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;受害者经常遭受显著的经济损失或全部个人信息被窃取并用于犯罪的目的。&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Victims often suffer from significant economic loss or theft of personal information and to use for criminal purposes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Online Refferences:&lt;br /&gt;1. &lt;strong&gt;什么是“网络钓鱼”？,[Online], Retrieved on 14 February 2011.&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;URL: &lt;a href="http://iask.sina.com.cn/b/12785184.html?from=related"&gt;http://iask.sina.com.cn/b/12785184.html?from=related&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/02/what-is-phishing.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-5953781722605045800</guid><pubDate>Thu, 10 Feb 2011 14:24:00 +0000</pubDate><atom:updated>2011-03-05T10:00:12.524+08:00</atom:updated><title>Poll week 2</title><description>Link to us: &lt;a href="http://snipurl.com/weektwo"&gt;http://snipurl.com/weektwo&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3y58e8eQBlpc2GM-s3b8yHvTOFoQYGBtZf9954b35BtJwvFK3TW228KRJK5PEchRAlLGoXQFwKKSy98VkHaG1ZF_7QkDVFxNv36CqLnxbAAxhS1kNlRUNjQBjGFRIgz9wZlV3Jn3KhTA/s1600/poll1.bmp"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 234px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3y58e8eQBlpc2GM-s3b8yHvTOFoQYGBtZf9954b35BtJwvFK3TW228KRJK5PEchRAlLGoXQFwKKSy98VkHaG1ZF_7QkDVFxNv36CqLnxbAAxhS1kNlRUNjQBjGFRIgz9wZlV3Jn3KhTA/s320/poll1.bmp" border="0" alt="" id="BLOGGER_PHOTO_ID_5572066820978724914" /&gt;&lt;/a&gt;&lt;br /&gt;Poll question of the second week, "Did you know more about phishing after reading this blog?". The result of 8 votes from our readers, 37.5% of them voted "I have gained a lot of knowledge", thanks for the vote and this blog is going to contribute wider information to you people. 12.5% of them voted "A little", and 50% of them voted "Normal", we'll continue gather more information about phishing in this blog.</description><link>http://phishing1122.blogspot.com/2011/02/poll-question-of-second-week-did-you.html</link><author>noreply@blogger.com (siew chin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3y58e8eQBlpc2GM-s3b8yHvTOFoQYGBtZf9954b35BtJwvFK3TW228KRJK5PEchRAlLGoXQFwKKSy98VkHaG1ZF_7QkDVFxNv36CqLnxbAAxhS1kNlRUNjQBjGFRIgz9wZlV3Jn3KhTA/s72-c/poll1.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-6779797806497825477</guid><pubDate>Thu, 10 Feb 2011 04:22:00 +0000</pubDate><atom:updated>2011-03-04T14:32:40.232+08:00</atom:updated><title>Why phishing website still exist?</title><description>&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/span&gt;&lt;i&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif';"&gt;Link to us: &lt;a href="http://snipurl.com/whyphishingwebsitesstillexits"&gt;http://snipurl.com/whyphishingwebsitesstillexits&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;i&gt;Mengikut statistik yang dikeluarkan pada tahun lepas, sebanyak 45% daripada 3 juta pengguna internet seluruh dunia tertipu dengan taktik laman web phishing ini. &lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;According to statistics released last year&lt;i&gt; &lt;b&gt;(2009)&lt;/b&gt; &lt;/i&gt;of many 45% from 3 million internet users worldwide fooled by the tactics of these phishing websites.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;b&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;A Group of people is easy to fooled&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;/div&gt;&lt;div align="left" class="separator" style="clear: both; text-align: center;"&gt;﻿&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.jmayz.com/wp-content/uploads/2010/12/maybank-fake-email.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" h5="true" height="236" src="http://www.jmayz.com/wp-content/uploads/2010/12/maybank-fake-email.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;i&gt;Figure 1: Phishing websites (Click the picture to enlarge)&lt;/i&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;The people are easily fooled by a phishing websites because they are first time uses the internet or online banking. Another reason is some of the group of people are very lazy to read &lt;b&gt;&lt;i&gt;perkara2&lt;/i&gt;&lt;/b&gt; &lt;b&gt;(matter2)&lt;/b&gt; like that and also lazy to find information on the latest &lt;b&gt;&lt;i&gt;taktik2&lt;/i&gt; (tactics2) &lt;/b&gt;fraud on the internet.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;The figure 1 show that you can look at the logo it still can be fooled, but when we look at the url (Uniform Resource Locator) given indeed &lt;b&gt;&lt;i&gt;sah2&lt;/i&gt; (valid2)&lt;/b&gt; this phishing websites. For those who do not know, victims may be deceived by the tactics of these phishing websites. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;b&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;How to avoid phishing websites&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://www.jmayz.com/wp-content/uploads/2010/12/maybank-fake.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" h5="true" height="189" src="http://www.jmayz.com/wp-content/uploads/2010/12/maybank-fake.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;i&gt;Figure 2: Phishing websites (Click the picture to enlarge)&lt;/i&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;i&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;b&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;To help you protect yourself from phishing websites by the following:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;ol style="margin-top: 0in;" type="1"&gt;&lt;li class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;b&gt;Do not click on links from a link provided via email. &lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;In general, the bank or the controlling party &lt;b&gt;&lt;i&gt;ap2&lt;/i&gt; (what2)&lt;/b&gt; online financial transactions will no contact us via the email. We should be contacted by phone if the party needs to updates the relevant &lt;b&gt;&lt;i&gt;maklumat2&lt;/i&gt; (information2).&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start="2" style="margin-top: 0in;" type="1"&gt;&lt;li class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;b&gt;Communicate personal information only via phone or secure web sites.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;You should be verify the identity of the person contact they and if possible, do the updates your account information in the nearest branch of a face to face. &lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start="3" style="margin-top: 0in;" type="1"&gt;&lt;li class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;b&gt;Check the url in the address bar. It is pointing to the right websites. &lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;Every time you login whatever websites, you must be double check the URL in the address bar of your browser. If you sure the correct url then can proceed with the transaction, if not, you can use the Google websites search list to compare it with the website address above &lt;b&gt;&lt;i&gt;(show the figure 2).&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt 0.5in;"&gt;&lt;b&gt;&lt;span style="font-family: 'Times New Roman','serif'; font-size: 12pt;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
References:&lt;br /&gt;
Jmay, Kenapa laman web phishing masih wujud?,[Online], updates&amp;nbsp;on&amp;nbsp;27&amp;nbsp;December 2010.&lt;br /&gt;
URL: &lt;a href="http://www.jmayz.com/kenapa-laman-web-phishing-masih-wujud/"&gt;http://www.jmayz.com/kenapa-laman-web-phishing-masih-wujud/&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #20124d;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://phishing1122.blogspot.com/2011/02/why-phishing-website-still-exist.html</link><author>noreply@blogger.com (WONG sing yee)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5835433995417652629.post-9201027028371713719</guid><pubDate>Sun, 06 Feb 2011 13:45:00 +0000</pubDate><atom:updated>2011-03-16T22:11:34.645+08:00</atom:updated><title>What does a phishing E-mails look like ?</title><description>&lt;span class="Apple-style-span" style="font-family: 'Helvetica Neue', Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal; "&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: 'Helvetica Neue', Helvetica, sans-serif; "&gt;&lt;b&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="color: rgb(55, 65, 75); line-height: 19px; "&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal; "&gt;Link to us: &lt;a href="http://snipurl.com/emailphishing"&gt;http://snipurl.com/emailphishing&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: 'Helvetica Neue', Helvetica, sans-serif; "&gt;&lt;b&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="color: rgb(55, 65, 75); line-height: 19px; "&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-size: 14px;"&gt;It is never a good idea to click on any hyperlink in an e-mail, especially from unknown sources. You never know where the link is really going to take you or whether it will activate malicious code. Some hyperlinks can take you to a fake HTML page that will try to scam you into typing sensitive information. If you really want to check out the link, manually retype it into a Web browser.Whenever you are passing sensitive information such as credit cards or bank information, make sure the address bar shows "&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;https://&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 14px; font-weight: normal;"&gt;" rather than just "&lt;/span&gt;&lt;span class="Apple-style-span"&gt;http://&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: 14px; font-weight: normal;"&gt;" and that you have a secure lock icon at the bottom right hand corner of your Web browser. You can also double-click the lock to guarantee the third-party SSL certificate that provides the https service. Many types of attacks are not encrypted but copy an encrypted page. Always look to make sure the Web page is truly encrypted.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="font-size: 14px; line-height: 19px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #37414b; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"&gt;As the technologies gets better and better, the people behind the phishing scams also become more devious. They now use pop-up windows, official logos, and mock-secure connections copied from actual Web sites.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #37414b; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #37414b; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;b&gt;Picture 1&lt;/b&gt;&lt;/span&gt; &lt;/b&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #37414b; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"&gt;shows an example of a fishing scam e-mail.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: #37414b; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"&gt;&lt;table style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; border-bottom-width: 0px; border-collapse: separate; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: middle; width: 620px;"&gt;&lt;tbody style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;tr style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;td align="center" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px; padding-bottom: 4px; padding-left: 5px; padding-right: 10px; padding-top: 4px; text-align: left; vertical-align: middle;"&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;b&gt;&lt;img alt="" border="0" src="http://www.techrepublic.com/i/tr/cms/contentPics/clip_image002.jpg?tag=mantle_skin;content" style="height: 639px; width: 576px;" /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;The link in this e-mail, which is suppose to go to eBay, actually goes somewhere else.You can see that this text is actually hiding a link to another site (66.246.90.60), as shown in the close up in &lt;/span&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;b&gt;Picture&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt; 2&lt;/b&gt;. And also, the original link text does not have a "https://" secure address, but if a link like this read "https://" you might think it was safe while it could actually be hiding a fake, non-secure URL.&lt;/span&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;b&gt;Picture&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt; 2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;img alt="" border="0" src="http://www.techrepublic.com/i/tr/cms/contentPics/clip_image003.jpg?tag=mantle_skin;content" style="cursor: hand; height: 117px; width: 576px;" /&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;span class="Apple-style-span" style="color: #37414b; line-height: 19px;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-weight: normal;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px 0px 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span" style="line-height: 19px;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"&gt;&lt;td align="center" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 14px; font-weight: normal; margin: 0px; padding-bottom: 4px; padding-left: 5px; padding-right: 10px; padding-top: 4px; text-align: left; vertical-align: middle;"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://phishing1122.blogspot.com/2011/02/what-does-phishing-e-mails-look-like.html</link><author>noreply@blogger.com (Marvin)</author><thr:total>0</thr:total></item></channel></rss>