Internet Security: Protecting Yourself from Phishers

AI Thread Summary
Phishing is a significant concern in online security, where attackers create fake websites to steal sensitive information like credit card details, personal identification, and passwords. A common question arises about how phishers can afford to set up these fraudulent sites, given that purchasing a domain typically requires a credit card. However, many phishers utilize stolen credit card information to register domains or take advantage of free web hosting services that do not require payment details. This allows them to remain anonymous and evade detection. The only traceable information may be an IP address, which can often be masked through proxies, complicating law enforcement efforts to identify the perpetrators. Overall, the discussion highlights the ease with which phishers can operate online, emphasizing the need for vigilance in protecting personal information.
GiTS
Messages
132
Reaction score
0
So I'm taking a computers for business class and the teacher did a lecture on how everyone on the interent is trying to steal from me. One thing he talked about was phishing. What I don't get, and he couldn't really answer, is that phisherman(phishers?) use websites to mimic legit sites to get you to give them your info to steal your credit card info. But you need a credit card to buy a website. So are these guys using their own credit card and just preying no one does a WHOIS lookup? It seems kind of like a catch 22 otherwise. They'd need my credit card to make a site to steal my credit card.
 
Technology news on Phys.org
more than likely they're using a credit card stolen from someone else. it's not always credit card info they're after either. Phishers in general are after any info that will let them hijack your identity: names, birth dates, SSNs, passwords, etc.
 
There are free hosts for websites that don't require you to have ad's on the website, and they would just ask for information which you could just lie about in order to make an account with them.

So the only link to the person behind this would be an ip address that may be logged with the website host, which may be behind many proxies...
 
You need a license to buy a gun, so how can someone use it in a robbery and then toss it away without getting caught.

You get the idea.

k
 
You don't need a credit card to have a website. You need an internet connection, that's all. It's pretty easy to steal those these days.

- Warren
 
Dear Peeps I have posted a few questions about programing on this sectio of the PF forum. I want to ask you veterans how you folks learn program in assembly and about computer architecture for the x86 family. In addition to finish learning C, I am also reading the book From bits to Gates to C and Beyond. In the book, it uses the mini LC3 assembly language. I also have books on assembly programming and computer architecture. The few famous ones i have are Computer Organization and...
I have a quick questions. I am going through a book on C programming on my own. Afterwards, I plan to go through something call data structures and algorithms on my own also in C. I also need to learn C++, Matlab and for personal interest Haskell. For the two topic of data structures and algorithms, I understand there are standard ones across all programming languages. After learning it through C, what would be the biggest issue when trying to implement the same data...

Similar threads

Replies
44
Views
5K
Replies
16
Views
3K
Replies
15
Views
4K
Replies
2
Views
502K
Replies
7
Views
3K
Replies
7
Views
4K
Replies
7
Views
3K
Back
Top