Internet Security: Protecting Yourself from Phishers

Click For Summary

Discussion Overview

The discussion centers around the mechanics of phishing, particularly how phishers create fraudulent websites to steal sensitive information from individuals. Participants explore the implications of website creation, the methods used by phishers, and the challenges in tracing their activities.

Discussion Character

  • Exploratory
  • Debate/contested

Main Points Raised

  • One participant questions how phishers can create websites to steal credit card information if they need a credit card to purchase a domain, suggesting a potential catch-22 situation.
  • Another participant proposes that phishers likely use stolen credit cards to register fraudulent websites.
  • It is noted that phishers seek various types of information beyond credit card details, including personal identifiers like names and social security numbers.
  • A participant mentions the existence of free web hosting services that do not require credit card information, allowing phishers to create sites without revealing their identity.
  • One participant draws an analogy comparing the situation to gun ownership laws and the potential for misuse, implying that regulations do not prevent illegal activities.
  • Another participant asserts that an internet connection is sufficient to create a website, indicating that obtaining a credit card is not a necessary step for phishers.

Areas of Agreement / Disagreement

Participants express differing views on the necessity of credit cards for website creation, with some arguing that stolen cards are used while others suggest alternative methods such as free hosting. The discussion remains unresolved regarding the specifics of how phishers operate.

Contextual Notes

Participants do not fully explore the legal implications or the technical details of domain registration and web hosting, leaving some assumptions unaddressed.

Who May Find This Useful

This discussion may be of interest to individuals studying internet security, those concerned about online privacy, or anyone looking to understand the tactics used by cybercriminals.

GiTS
Messages
132
Reaction score
0
So I'm taking a computers for business class and the teacher did a lecture on how everyone on the interent is trying to steal from me. One thing he talked about was phishing. What I don't get, and he couldn't really answer, is that phisherman(phishers?) use websites to mimic legit sites to get you to give them your info to steal your credit card info. But you need a credit card to buy a website. So are these guys using their own credit card and just preying no one does a WHOIS lookup? It seems kind of like a catch 22 otherwise. They'd need my credit card to make a site to steal my credit card.
 
Technology news on Phys.org
more than likely they're using a credit card stolen from someone else. it's not always credit card info they're after either. Phishers in general are after any info that will let them hijack your identity: names, birth dates, SSNs, passwords, etc.
 
There are free hosts for websites that don't require you to have ad's on the website, and they would just ask for information which you could just lie about in order to make an account with them.

So the only link to the person behind this would be an ip address that may be logged with the website host, which may be behind many proxies...
 
You need a license to buy a gun, so how can someone use it in a robbery and then toss it away without getting caught.

You get the idea.

k
 
You don't need a credit card to have a website. You need an internet connection, that's all. It's pretty easy to steal those these days.

- Warren
 

Similar threads

  • · Replies 44 ·
2
Replies
44
Views
6K
  • · Replies 16 ·
Replies
16
Views
3K
Replies
4
Views
11K
  • · Replies 37 ·
2
Replies
37
Views
7K
  • · Replies 4 ·
Replies
4
Views
4K
  • · Replies 15 ·
Replies
15
Views
4K
  • Sticky
  • · Replies 2 ·
Replies
2
Views
506K
  • · Replies 7 ·
Replies
7
Views
4K
  • · Replies 7 ·
Replies
7
Views
4K
  • · Replies 7 ·
Replies
7
Views
4K