Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Chapter 6: Phishing, SMishing, and Vishi... > Frequently Asked Questions - Pg. 194

194 Chapter6·Phishing,SMishing,andVishing FrequentlyAskedQuestions Q: I receive a lot of spam and phishing e-mails. Why? A: Try to avoid posting e-mail addresses on Web pages or subscribing to untrusted mailing lists. Spammers harvest the Web using crawlers to collect e-mail addresses. Some researchers prefer to mask e-mail addresses by inserting them as images in Web pages rather than plain text. Q: How can I report the phishing e-mails I've received? A: You can report phishing e-mails at several portals--for instance, phishing-report@,, and Q: I think I'm a victim of electronic identity theft. What should I do? A: Contact the legitimate bank or financial institution to close the associated account. Then, contact the credit bureaus to place a fraud alert on your credit report. File a complaint with the Federal Trade Commission (FTC). Change your online passwords to protect yourself from future attacks. Finally, keep records of everything and follow up with the appropriate agencies. Q: I travel a lot and connect to open wireless access points. How can I protect myself against various types of attacks associated with open access points? A: It is not advisable to connect to open wireless access points; however, if you have no choice but to connect to one, then use an encryption scheme such as VPN or SSH to encrypt your traffic in between. Q: Although I make sure to type the legitimate URL of my bank in the Web browser address bar and I do not click any links provided in suspicious e-mails, I was a victim of phishing. Why? A: Several Trojan horses overwrite host files in Windows operating systems and hijack browser proxy settings to redirect victims to spoofed sites although they type in the legitimate URL in the Web browser address bar. It is advisable to run an antivirus application periodically and make sure it is up-to-date as well. Outdated antivirus applications are considered useless since virus writers modify viruses frequently to evade detective mechanisms.