How Phishing Works


To hide the identity of the phisher, phishing attacks are not sent from the phisher's computer. Instead, a phisher uses or hires a person who controls an army of thousands of zombie PCs whose owners don't know they have been turned into zombies. The person controlling the zombie army tells them to send out the email composed by the phisher.



 



How the Internet Works
How the Internet Works (8th Edition)
ISBN: 0789736268
EAN: 2147483647
Year: 2004
Pages: 223

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net