The article describes what password phishing is, how it is carried out, what is used by cybercriminals and how to protect yourself from it.
Start
Only some 15 years ago, far from everyone could boast of having a home computer, and they could only dream of a fast and unlimited Internet. Fortunately, such technologies are developing very quickly, and nowadays you will not surprise anyone with a PC or access to the Network. Every year, digital technology is becoming more accessible, simple and attractive. Almost all enterprises, institutions and organizations have switched to electronic document management, and the range of services provided via the Internet is constantly growing and expanding.
, . , , . . , , , , «» .
, . , - -, . . , , , . ? .
. «» (. fishing — , ). , , «» , «» . ?
, , , , , . ?
. , , , , , , . , , e.mail./login?email, e..mail./login?email. , , , . , ( ) . , .
, , , , , - , .
. ?
, . -, , - , . , , . -, . , , . -, , , , , , . .
: , , - .
10 , , . , . , , , .
. , . , , , , , . .
, .
, , . «» , , . .
«», , , . – . .