Webjacking, and how to boot it out
โ Scribed by Lance Mueller
- Book ID
- 104392350
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 125 KB
- Volume
- 2006
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
Once installed on the victim's machine, the trojan either edits the host file or modifies the DNS server settings to re-direct specific (or all) look-ups to a fraudulent web server. This server will typically deliver appropriate content most of the time, but is able to re-direct selective requests to a fake web site. The user doesn't click on a link and has no way of knowing that the requested data has been falsified.
Moving target
Phishing is a specific cyber crime that relies heavily on 'social engineering', non-technical breaches of security that focuses on human interaction: in other words, tricking users into doing something they shouldn't. As such, phishing is constantly adapting. Criminals are continually seek ways to trick users and catch them unawares. Technology advancements or a new type of snare to drawn in users are all part of the toolkit.
For more information on avoiding phishing scams, check out the APWG's Consumer Advice on Phishing, www.antiphishing.org.
๐ SIMILAR VOLUMES