Gone Phishin’

So last week we talked about hackers for activism, but as we are all well aware, hacking isn’t always used for “good”. Ever had a friend tell you “Hey dude, uh, your email address is sending me like all these virus links”? Just me? Maybe that’s what I get for using Hotmail in 2003. We’ve all made mistakes, can we just let it go?

Hacking online has meant that we have needed to create more and more secure protocols to transmit private information online (and no I don’t mean your nasty photos.) Things like phone numbers, back account details, addresses and credit card numbers are all vital pieces of information that we need to keep protected online.

Now you can only help stupidity so much, but for those of us who understand how our credit cards work it’s usually important that we only use our cards online though a secure protocol. So, fun fact, if it doesn’t say “https: in front of the URL on your browser, probably don’t go plugging your ‘deets’ into it.

https

See? Nice and secure.

With secure protocols online proving problematic for some hackers, they moved to new means of getting your information. How you ask? Well, you might enjoy going fishing, but hackers have much more fun going “Phishing”

Phishing is the act of fraudulently communicating with someone in order to collect anything from Usernames and Passwords to Credit Card information. Phishing continues its extended metaphor but luring in the “phish” by “baiting” them, often by targeting large fan-bases of particular celebrities, some examples being Demi Lovato and Selena Gomez. The Celebrity Nude Photo scandal was another hacking shock which came about, it’s thought, from simple phishing and email hacks – It goes to show, maybe having a password that isn’t your birthday is a good idea.

Advertisements

6 comments

  1. romyobrien · · Reply

    Really insightful and quite confronting look into the phishing aspect! I didn’t really understand the topic during the lecture but after reading your blog I totally get it! Ill definitely be making sure that there is an http in all my urls before I buy anything online again! Thanks!

  2. Nice work here. I think that the more security we try to employ online, we still won’t be able to avoid these hackers. Look how easy they got those celebrity photos and look how easy LulzSec got people’s personal data even on the Playstation network. We can’t hide from them, they’ll find a way.

  3. I love the range of sources you use and they aren’t always the sources people know about, it shows that you research your blogs thoroughly

  4. You’ve drawn on some great sources in this post that really validate the points that you’re making. Your arguments are well structured and easy to read – great work!

    I personally haven’t heard of ‘phishing’ too much, so I’ll be interested to further research some of the ideas you’ve put forward in this post.

  5. I love your style of writing – it’s very conversational and easy to read, and makes complex topics more accessible. Your examples, however, might need some updated research – phishing is by no means new. I remember trying to explain to my friend why her Myspace kept getting hacked in 2007. Another idea to take this blog up a level would be to link to something that teaches you how to select a secure password or protect your accounts.

  6. You’ve really covered the aspect of phishing really well and explained it better than the way the lecture did. The whole blog has clearly been thoroughly researched and covers the whole topic really well

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: