How do you deal with spoofing / phishing?

Which device you discovered when it was threatened was compromised with a web service.

+5
source share
6 answers

The key to this problem is to determine some difference between a request to a real site and a request to a spoof site.

The simplest difference is the preference for a cookie-based user interface. The cookies installed on your (real) website will ever be returned to your website and will never be sent to the spoof website.

, cookie , , , / cookie, , spoof.

+1

, , , , . , !

FWIW, , , . , ..

, , - . , , , .

, .

+5

, .

, , , , . , , , . , -, .

+1

- . Spoofing , - ( - ). , , , eBay , , - ( ). (, , , url ..), .

, ( , ), . , - - ( ).

0

, "" . , , , .

-1
  • (, ).

  • You can display the image after registration, which the user uploaded if the user does not see his image (personal that only he could see) than this is not a real website.

-1
source

All Articles