Phishing synonyms

fiiŋ
Category:
Part of speech:
Present participle of crack.
1
0
To employ to the greatest possible advantage:
1
0
A form of identity theft whereby a scammer uses an authentic-­looking email from a large corporation to trick email receivers into disclosing online sensitive personal information, such as credit card numbers or bank account codes. A form of identity theft whereby a scammer uses an authentic-­looking email from a large corporation to trick email receivers into disclosing online sensitive personal information, such as credit card numbers or bank account codes. According to a 2004 report released by Gartner, Inc., an IT marketing research firm, phishing exploits cost banks and credit card companies an estimated $1.2 billion in 2003. Moreover, according to the Anti-Phishing Working Group (a nonprofit group of government agencies and corporations trying to reduce cyber fraud), more than 2,800 active phishing sites were known to exist. In April 2005, a new “cousin” of phishing was defined and called “WiPhishing” (pronounced “why phishing”)—an act executed when an individual covertly sets up a wireless-enabled laptop computer or access point to get other wireless-enabled laptop computers to associate with it before launching a crack attack. About 20% of wireless access points use default SSIDs. Because users failed to rename them, a cracker can quite easily guess the name of a network that target computers are normally configured to, thereby gaining access to the laptop computer and putting malicious code into it. Intrusion detection appliances such as AirPatrol Enterprise have been designed to detect wireless exploits. Firms having wired networks are at risk of being cracked if employees’ laptop computers are left on. Instead of exploiting wireless networks with WiPhishing, crackers could do even more damage by hijacking the legitimate connection to a wired computer network, exploiting the soft underbelly of that network, and launching an invasive attack. Levinsky, D. Hacker Teenage Pleads Guilty. [Online, May 14, 2005.] Calkins Media, Inc. Website. http://www.phillyburbs.com/pb-dyn/news/112-05142005-489320.html; Leyden, J. WiPhishing Hack Risk Warning. [Online, April 20, 2005.] http://www .theregister.co.uk/2005/04/20/wiphishing; MarketingSherpa, Inc. The Ultimate Email Glossary: 180 Common Terms Defined. [Online, 2004.] MarketingSherpa, Inc. Website. Reg SETI Group Website. http://www.marketingsherpa.com/sample.cfm?contentID=2776.
1
0
The definition of fraud is something said or done in a dishonest way to trick people.
1
0
A form of identity theft whereby a scammer uses an authentic-­looking email from a large corporation to trick email receivers into disclosing online sensitive personal information, such as credit card numbers or bank account codes. A form of identity theft whereby a scammer uses an authentic-­looking email from a large corporation to trick email receivers into disclosing online sensitive personal information, such as credit card numbers or bank account codes. According to a 2004 report released by Gartner, Inc., an IT marketing research firm, phishing exploits cost banks and credit card companies an estimated $1.2 billion in 2003. Moreover, according to the Anti-Phishing Working Group (a nonprofit group of government agencies and corporations trying to reduce cyber fraud), more than 2,800 active phishing sites were known to exist. In April 2005, a new “cousin” of phishing was defined and called “WiPhishing” (pronounced “why phishing”)—an act executed when an individual covertly sets up a wireless-enabled laptop computer or access point to get other wireless-enabled laptop computers to associate with it before launching a crack attack. About 20% of wireless access points use default SSIDs. Because users failed to rename them, a cracker can quite easily guess the name of a network that target computers are normally configured to, thereby gaining access to the laptop computer and putting malicious code into it. Intrusion detection appliances such as AirPatrol Enterprise have been designed to detect wireless exploits. Firms having wired networks are at risk of being cracked if employees’ laptop computers are left on. Instead of exploiting wireless networks with WiPhishing, crackers could do even more damage by hijacking the legitimate connection to a wired computer network, exploiting the soft underbelly of that network, and launching an invasive attack. Levinsky, D. Hacker Teenage Pleads Guilty. [Online, May 14, 2005.] Calkins Media, Inc. Website. http://www.phillyburbs.com/pb-dyn/news/112-05142005-489320.html; Leyden, J. WiPhishing Hack Risk Warning. [Online, April 20, 2005.] http://www .theregister.co.uk/2005/04/20/wiphishing; MarketingSherpa, Inc. The Ultimate Email Glossary: 180 Common Terms Defined. [Online, 2004.] MarketingSherpa, Inc. Website. Reg SETI Group Website. http://www.marketingsherpa.com/sample.cfm?contentID=2776.
1
0
Find another word for phishing. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for phishing, like: cracking, exploit, electronic mail or email, fraud and identity theft or masquerading.