Current location - Education and Training Encyclopedia - Graduation thesis - Phishing will use many related technologies, but not including.
Phishing will use many related technologies, but not including.
Fishing uses many related technologies, but not Bluetooth.

Phishing attackers use fraudulent emails and fake websites for online fraud activities, and the deceived often disclose their private information, such as credit card number, bank card account, ID number, etc.

Fraudsters usually disguise themselves as trusted brands such as online banks, online retailers and credit card companies to defraud users of private information.

As early as 1987, phishing technology was described in the form of papers and presentations and delivered to the international HP user group under the Interex system. The word "phishing" was first mentioned in the alt news group. Online service. America-online usenet10.2, 1996, although this term may have appeared in the written version of Hacker Magazine 2600 earlier.