And I Went Phishing...

In: Computers and Technology

Submitted By rebeccak76
Words 675
Pages 3
And I Went Phishing….
By Rebecca Key
01/31/14

SCI 305: Technology and Society
Professor: Pat Gonzalez

My experience with the “phishing” quiz surprised me I scored 90%. I only missed one and to be honest I debated it about it. This was the only one that I really had an issue with. I thought it was phishing but then when it wasn’t asking for any personal information I second guessed myself. I missed the one from Bank of America about the ALERTS, to the account. I said it was legitimate. The give aways were that is was improperly formatted sender, it was addressed dear customer and not the customer’s name, and color coding in not used in formal communication. The main things that helped me identify whether it was legitimate or not was first, the spelling and grammar, several had very poor spelling and incorrect grammar. I am a bit OCD in this area so that is the first thing that jumped out. The second thing that helped identify the “phishing” was the request for personal information. There was one supposedly from the IRS wanting my social security number and my credit card number to have my tax return put on my card. According to Microsoft Office’s official page, “Requests for personal information in an e-mail message is the most common “phishing” detector. Most legitimate businesses have a policy that they do not ask you for your personal information through e-mail. Be very suspicious of a message that asks for personal information even if it might look legitimate”. I don’t typical notice phishing messages because I have a habit of deleting all emails that I am not expecting correspondence from. I never check my spam unless I know there may have been something sent there by accident from an expected origin. I’m sure that I have some in my email right now, but I don’t read them. Several years ago, I got one of those emails…...

Similar Documents

Katrina: What Went Wrong?

...Monday morning, 29 August 2005, this is a day most New Orleans residents will never forget. This was the day a category 5 hurricane named Katrina made its catastrophic debut to the Gulf Coast region and killed over 1,300 people. (The White House, 2006, p. 1) After it was all said and done, the nation was shocked at the events that unfolded in Alabama, Louisiana and Mississippi and people were left wondering, “What went wrong?” National Geographic reported that the storm originated about a week earlier, 23 August, in the Caribbean and worked its up from the Bahamas making landfall Thursday, 25 August, in Miami. Winds at this time were 75-80 mph making it a category 1 hurricane causing some tree damage and killing two people. (Drye, 2005) The storm lost strength for a little while but once it hit the warm waters of the Gulf of Mexico, it rapidly gained momentum and before long reached wind speeds up to 175 mph making it a category 5 hurricane. On Sunday, 28 August, New Orleans mayor, Ray Nagin, issued a mandatory evacuation order. Roughly 24 hrs later, the full strength of Katrina slammed into New Orleans and Biloxi. (Drye, 2005) Local and state emergency managers are responsible for coming up with a plan of action for different hazardous situations. Once a situation gets overwhelming for those levels of management, federal assistance is then requested. Prior to Hurricane Katrina’s arrival, various local emergency management agencies (LEMAs), such as local fire, police,......

Words: 1717 - Pages: 7

Reconstruction-What Went Wrong?

...RECONSTRUCTION, WHAT WENT WRONG I. Historiography of Reconstruction A. Early Views Journalists, Poets, & Rebels Negative view of Reconstruction Sidney Andrews, The South Since the War (1866) John Dennett, The South as It Is. Southern frame of reference Sidney Lanier (poet) Attempt to justify Civil War B. Early Professional Historians John Ford Rhodes Ohio Democrat Not impartial Blamed North for problems of Reconstruction’ Claimed Black Rule forced on South at point of bayonet John William Burgess Tennessee Unionist Former Union soldier Studied at University of Berlin Organized History Graduate Program at Columbia University Produced historians such as U.B. Phillips and William Archibald Dunning Traditionalist view of Reconstruction Burgess, Phillips & Dunning Basic view: Stressed Southern problems Minimized achievements of Freedmen Regarded White Supremacy as normal in South C. Dunning School And Traditionalism William Archibald Dunning Taught at Columbia University Attracted best historical minds of his day Wrote histories of their own states James W. Garner, Reconstruction in Mississippi (1901) Walter Lynwood Fleming, Civil War and Reconstruction in Alabama (1905) William W. Davis, Civil War and Reconstruction in Florida (1913) Clara Mildred Thompson, Reconstruction in Georgia (1915) Histories very detailed and accurate BUT......

Words: 1994 - Pages: 8

Phishing

...Phishing Jatarra Rodman Professor Romero CIS 324 November 15, 2013 Is it Legitimate? Today, the Internet plays a very important part in the lives of many people. Users are now able to bank online, shop online, apply for jobs online, and perform a number of other tasks that users decades ago were not able to do. Even though the Internet provides users with many conveniences, unfortunately, the Internet is also used to commit many crimes. Phishing is a very common method that thieves use to “steal personal information through spamming and other deceptive means” (“History”, n.d.). The first recorded phishing scam occurred with AOL users in the late 1990s, and was very successful, simply because users did not know any better. Once users became aware of such scams, security meaures were increased, but that did not stop thieves from becoming more creative. Today, the most common phishing scams consist of “an e-mail message [that] tells the victim to click on a link to what purport to be the Web site of a well-known bank or online company” (Baase, 2008). It has become increasingly important for Internet users to be alert and aware of the type of scams that are designed to steal information and potentially identities. Internet users that fall into phishing traps quickly become victims of identity theft and credit card fraud. On average, these scams cost individuals about $1200 (SonicWALL, 2012). To avoid these scams, Internet users should be extra careful when opening......

Words: 1415 - Pages: 6

Never Went to Church

...Never Went To Church The loss of a family member can be a hard thing to deal with, and some people get despaired by whether they should start to believe in something - a religion, to help them get through the rough times. This is what Mike Skinner does in the song “Never Went to Church” from 2006, which is dedicated to his late father. Skinner finds help in his father - even though he is not with him anymore. The loss of his father makes him consider the thought of going to church, and at least he decides to take his advice. He is going to hedge his bets by visiting a priest, a rabbi and a protestant clergyman - he is trying to find something to believe in. Skinners loss makes him go through a thousand thoughts about what he has left to remind him of his father. He is afraid that he has lost him ‘for good’ - that he does not have anything at all left. At first he cannot find anything to remind him, but the more he thinks about it, the closer he comes to the conclusion that he actually does have something; himself: “I guess then you did leave me something to remind me of you, every time I interrupt someone like you used to do, if I do something like you, you’ll be on my mind all through because I forgot, you left me behind to remind me of you” (p. 2 ll. 13 - 14). Skinner realizes that he has himself to remind him of his father, because they have some of the same traits and habits. The whole song trough, Skinner sings about how his father was and what he is supposed......

Words: 898 - Pages: 4

Never Went to Church

...The loss of a family member can be a hard thing to deal with, and some people get despaired by whether they should start to believe in something - a religion, to help them get through the rough times. This is what Mike Skinner does in the song “Never Went to Church” from 2006, which is dedicated to his late father. Skinner finds help in his father - even though he is not with him anymore. The loss of his father makes him consider the thought of going to church, and at least he decides to take his advice. He is going to hedge his bets by visiting a priest, a rabbi and a protestant clergyman - he is trying to find something to believe in. Skinners loss makes him go through a thousand thoughts about what he has left to remind him of his father. He is afraid that he has lost him ‘for good’ - that he does not have anything at all left. At first he cannot find anything to remind him, but the more he thinks about it, the closer he comes to the conclusion that he actually does have something; himself: “I guess then you did leave me something to remind me of you, every time I interrupt someone like you used to do, if I do something like you, you’ll be on my mind all through because I forgot, you left me behind to remind me of you” (p. 2 ll. 13 - 14). Skinner realizes that he has himself to remind him of his father, because they have some of the same traits and habits. The whole song trough, Skinner sings about how his father was and what he is supposed to do now that he is gone....

Words: 379 - Pages: 2

What Went Wrong

...Assignment 2: What Went Wrong? Was the bank justified in terminating Darrell on the grounds of his prior embezzlement conviction? Explain. Even though Darrell was convicted of embezzlement as a bank teller previously and spent time in jail, I believe in this instance the bank was not justified in terminating Darrell on the grounds of his prior embezzlement conviction. The two hiring persons from the bank did not communicate with each other about Darrell’s prior conviction on embezzlement so therefore he was hired by the bank with that conviction on his record giving him a second chance at doing the right thing. Most employees in the United States work "at will." That means an employer may choose to fire an employee at any time, for any reason, unless that reason is illegal. State and federal laws prohibit employers from relying on certain justifications for firing employees, such as discrimination or retaliation. If an employee has an employment contract -- whether written or oral, express or implied -- that contract may limit an employer’s ability to terminate the employee. If an employment contract exists, you must treat the employee fairly and fire the employee only for "good cause." The Implied Covenant of Good Faith and Fair Dealing - A wrongful discharge suit based on the implied covenant of good faith and fair dealing usually is a contract claim (Mallard 2013). Employment discrimination is protected under the 4th & 5th Amendment as well as Title VII of the......

Words: 765 - Pages: 4

Something Went Sour at Parmalat

...Something went sour at Parmalat The Italian dairy food corporation Parmalat SpA was founded by Calisto Tanzi in 1961 and grew to a global company. It had about 140 production centers, 36,000 employees and 5,000 contracted dairy farms (http://en.wikipedia.org/wiki/Parmalat). The dairy food giant defaulted on debt in November 2002 and filed bankruptcy in December 2003. It sounds ridiculous because Parmalat’s subsidiary in Cayman Islands had a $4.9 billion cash balance in Bank of America account. However, this account was falsified. Meanwhile, Parmalat also hid losses of $10 billion and increasing assets as high as $19 billion. The auditors did not show enough professional skeptism and due care during the audit. 1. What steps does an auditor ordinarily take when confirming cash balances held on deposits with financial institutions? The auditors usually require a confirmation letter from the financial institution to check if the account balance of bank agrees with the numbers on the company’s books. Auditing standards require direct communication that mailing the confirmation letter to the bank be sent by the audit firm and responded directly to the firm in case of any change by client. The confirmation letter also should be received by mail with post stamp and original documents rather than the facsimile in the case. If auditors believe the company’s internal control is not strong enough, they may: (1) trace the accounts to see whether the transactions are......

Words: 724 - Pages: 3

Where She Went

...Camaron,Grace, Kozak, Where She Went Gayle Foreman Perfection Learning Prebound 02/25/13 This novel mainly takes place in Manhattan, and Brooklyn, New York. With frequent flashbacks to Mia and Adam’s days in Oregon. Three years after Mia and Adam break up. Mia has graduated Julliard and Adam and his band has become a worldwide phenomenon. It's been three years since the accident when Mai’s parents and only sibling died and she awoke from a coma, and Mia broke Adam's heart and walked out of his life forever. Now, Mia is a Julliard and Adam is a HUGE rock star with headlines and a celebrity girlfriend. Than one night a twist of fate brings them together. after running into each other Mia brings Adam to her favourite places in the city that has become her new home. They talk about why she left him and what has happened in their lives since they've broken up, and went their separate ways in life. They end up opening up to each other. discovering that after all of this time they are still in love with each other going on to coordinate their schedule so that could see and be with each other more. After a great turn of events with fate on their side Mia and Adam meet after Adam accidentally attends one of Mia's concerts while in New York City for business and Mia and Adam get to talk and catch up and go over what has happened over the last three years without the other person in their life and Mai tells Adam The reason that she left him and Oregon and ran away to new york and......

Words: 617 - Pages: 3

The Big Truck That Went by

...People who lost everything and mostly those who were badly infected by the earth quake wouldn’t have gone a day without having their daily meals if, the government or higher people in society would have distributed those food supplies given by other countries to help people from starvation. There would have been more food supplies but since the earth quake was caused by a natural disaster that means Port-au-Prince would have been eating foods that are only in can instead of food that are planted on the ground since it might not be safe for them. In as much as things would have been much different if the donor aids were actually used to helped the people instead of the governments kept it to themselves for their own selfish ways, however, I would have liked to see some of that money been invested in Educating more people in the country. Most of the children in Haiti, who are the future leaders of tomorrow either lost their parents due to the cause of the earth quake, some parents end up been disables, some lost everything they have and others died which leave these children been orphans or with no hope of ever been able to go to school, because their guardians can’t afford to send them to school. Education is one of the most important element in the success of every nation, so if the government can built schools in the country and give every children from k12 to Grade 12 a free education, also providing them with everything they need in the classroom starting from books......

Words: 1017 - Pages: 5

Phishing

...1. Phishing= phone+ fishing Definition: Phishing is the attempt to acquire sensitive information by using malware. Phishing is a homophone of fishing, which involves using lures to catch fish. Typically a victim receives a message that appears to have been sent by a known contact or organization. An attachment or links in the message may install malware on the user’s device or direct them to a malicious website set up to trick their personal information, such as password, account IDs or credit card details. To make phishing messages look like they are genuinely from a well-known company, they include logos and other identifying information taken directly from that company’s website. The malicious links within the body of the message are designed to make it appear that they go to the spoofed organization. The use of subdomains and misspelled URLs (typosquatting) are common tricks, as is homograph spoofing -- URLs created using different logical characters to read exactly like a trusted domain. Some phishing scams use JavaScript to place a picture of a legitimate URL over a browser’s address bar. the main reason for this is that it is more difficult to identify a phishing site on a mobile device than on a computer, due to page size and other hidden factors making it difficult to tell a site of this type from a clean one in a small 2. How phishing works: From beginning to end, the process involves: 1) Planning. Phishers decide which business to target and......

Words: 1870 - Pages: 8

Oh No, What Went Wrong

...Tada omg, it went. Wow. Omg what this is just to fill up space wow. Now this sucks. Fill up space, fill up space, fill up space, fill up space. Magically done with this shit omg. Akjalfj adfjakfj dkfja;jfs adflaflaj kfjalsdjf akdjfal afkja f a lajfdlaj aflaj adfa adfalfjlk; asdklfjasld I have no patience for this shit. Omg why. I have so much to do wtf. Adfas adfadf afd adfa adf ljl asdf woeriu afd l;jasdf jj as I just put rand whit soen. Im staring at the celling. Im not even looking at the computer. . thank you typing class. Bwahahaha. Aljfsl asdjflk asdfjop cn jj I a was the we they knew. Omg. I just need to get laid. Whoot whoot . plane. My ex is an asshole. His little scrawny elf looking self. He was luck he got a girl as good looking as me. Little bitch. Little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitchv little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch little pussy ass bitch little bitch little bitch little bitch little bitch little bitch little bitch little bitch......

Words: 289 - Pages: 2

Largo Books - What Went Wrong?

...Largo Books encountered a serious case of "spear phishing". Kaspersky Total Security defines spear phishing as, "an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer." Largo Book customers were mislead into thinking that they had received an actual email from the company, presenting them with a deal most wouldn't pass up. A link was given in the email, proving its validity, and most likely asked for information like name, address, and credit information, typical questions a hacker would ask in order to receive the offered "deal". Sounding like this was a direct attack to Largo Books, hackers may have gotten into the network of the company in order to email its customers, compromising their Information System (IS). In order for this hack to have been as successful as it was, this scam had to be convincing enough to have hundreds of Largo Book customers respond. Valacich describes various types of IS used in organizations, and when matching its purpose to its type, electronic commerce system, customer relationship management system, and enterprise resource planning systems may have been the companies most vulnerable areas of attack. Today, hundreds of companies go through this exact issue. I personally have received emails from companies like Apple and even cell phone......

Words: 477 - Pages: 2

The Lift That Went Wrong

...The Lift that Went Wrong “I wanted revenge; I wanted to dance on the graves of a few people who have made me unhappy. I’ve done it and got more than I ever dreamed of” (Anthony Hopkins). Revenge is a very poor way of retaliating to a situation. Mrs. Foster, a perfectionist, is being teased maliciously by her husband and is sick of playing games with him. Mr. Foster tries to push his wife into hating him or even making a fatal mistake towards their relationship. In the story, The Way Up to Heaven, Roald Dahl shows how a husband and wife can fall out of love by the wrong kind of teasing. When a false-hearted man falls out of line with his cruel intentions, a woman fails to listen to her hard and commits a great sin. Mrs. Foster makes an obsession out of being late to different occasions. Mrs. Foster’s nerves would start to get to her and she would twitch if the mere thought of being late would slip into her head. The twitch was a “tiny vellicating muscle in the corner of the left eye, like a secret wink” (156). Mrs. Foster would also “flutter and fidget about from room to room until her husband, emerged from his privacy” (156). Mrs. Foster has more than physical affects that happen as a result of her problem. She thinks that she will be late for her plane flight while exaggerating and using statements like “I know, I know, I know I’m going to miss it” (159) and “Now I really will miss it!”(159) to add more stress on herself. Mrs. Foster......

Words: 530 - Pages: 3

Phishing Attacks

...urweqpoiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiPhishing scams are usually fake email messages coming from what seems to look like a legit business. The messages mostly redirect you to a fake website which gets you to enter your private and personal information. These scammers then commit identity theft with all the information they can gather. The term phishing initially came from using email to fish for passwords and personal information from a sea of internet users. In the early days, phishing was stealing password or accounts online, now phishing has extended to stealing personal and financial data. In the 90’s phishing used emails, fooling internet users to reply giving there password and credit card information. Now phishing has grown to phony websites, or installation of Trojan horses by key loggers. Types of Phishing Methods Fake Website A URL similar to a legit site is purchased and then designed to look like the legit website. The hacker then sends out messages to victims, which fools them to click a link, which redirects them to the fake website. The victim them logs on, which sends the information to the hacker. Fake pop up Addition to the fake websites is the fake pop up attacks. With this attack a link is sent, but rather than sending a fake website link, the link sent is the legit site. As soon as the website loads, a pop up comes which requires the user to enter all there info to login. The info is then sent to the hacker. Fake website with...

Words: 1004 - Pages: 5

Went to the Zoo

...THE DAY I WENT TO THE ZOO THE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE ZOOTHE DAY I WENT TO THE......

Words: 632 - Pages: 3

Rare Earth | HD How to Lose Friends and Alienate People (2008) | The Land Before ...