Monday, October 31, 2011

Phishing Tails

1. If you received this message in your email, what would you do with it?
- I would think it was fake and then I would delete it.
2. Would you be more inclined to act if you are a regular user of eBay?
- I would probably
3. What does the URL (link address) tell you about the origin of this message?
- It tells me that you would have to verify your information to be able to use ebay.
4. Do you think it’s real? Why or why not?
- No, because it sounds like some stuff that you would make up.

                                        Part 2

1. What is “phishing”? Give some examples cited in the article.
- When some kids put stuff that are broken and still try to sell them.
2. According to government officials and private investigators, who are the most likely groups behind most phishing attempts?
- Kids 18 and younger
3. How is fraudulent email spread that makes it so difficult to track?
- It is so hard because they would delete there stuff and wouldnt put there real info.
4. Do federal investigators think Helen Carr is a typical phisher? Why or why not?
- Yes because they caught him sending emails before.
5. According to Christopher Wray, what is the single biggest type of consumer fraud?
- Identity theft
6. According to the article, why is it often difficult to tell the difference between a legitimate and fraudulent email?
- Because the fishers are more sick every time they do it.
7. ASK What are some ways phishers try to hook unwary recipients, according to the article?
- SThey would send fake stuff to people to get that persons info and they use computer worms.

No comments:

Post a Comment