


"Prepare your milktea...Prepare to discover the world of E-commerce..."
Nowadays, the threat of online security has always trouble the user of inter net. It is a serious matter for internet user regardless of who you are as long as you have given out your private information such as name, credit card number or even bank accountnumber. Its say so because the moment you give out you information on the web, you are actually expose at the danger of losing personal data or theft of important data which maybe in form of business information, cash at your bank.
Furthermore, some of the illegal activities including hack into internet user’s computer through malicious software. Typically, these malicious software including virus, worm, rookit and Trojan horse application. These software are always can be found at the website that is more likely being trust by public to be visit even user surf the business website or download something from the web.
Also, the ‘private’ information of the user can also being track back notwithstanding the file has been deleted at the ‘recycle bin’. These fact show us that the data are actually available publicly for the ‘hacker’ once the data have been store in the computer.
Phising, is actually a variation on "fishing" but the idea behind this is almost the same as both of them are trying to tempt ‘fish/victim’ through the ‘bait’. The difference between them is that the ‘phising’ is trying to get the private or sensitive information criminally. A phishing technique was described in detail as early as year 1987, it can be carried out under the name of online business transaction website, such as Pay Pal, e Bay and online banks.
A phiser can conduct criminal activities by sending an email or instant –message to ask the potential victim ‘update their account’, ‘verify their user account’,or "confirm billing information" under illegal website such as e-bay, which in fact is an illegal website. The one who response in action to the email will then become the victim as the phiser can get the sensitive information through these ‘illegal website’. The phiser can do anything they wish for fraudulent purpose.
There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing.
Internet user should not give out their private information easily on the web. They can always contact the company which the e-mail originates to confirm the action of ‘verify account'.
Data can be defined, or classified, with labels such as public, personal, sensitive, confidential, secret, top-secret, or other categories. The more valuable or sensitive the data, the more it needs to be protected. The following tips will help you to safeguard your personal and financial data: