Contact French version  
Other definitions

Computer Security Investigations

As Computer Security consultant and Computer Forensics Investigator, I provide a large scale of IT services for investigation, everywhere you are. In most cases, you don't have to move are avalaible online, in several languages.

I perform data collections, computer forensic investigations, electronic discovery strategies, and targeted audits to obtain informations or evidence .


From Wikipedia, the free encyclopedia

is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as well. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, and technical measures. The first recorded mention of phishing is on the Usenet newsgroup on January 2, 1996, although the term may have appeared even earlier in the print edition of the hacker magazine 2600. The term phishing is a variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' financial information and passwords. The word may also be linked to leetspeak, in which ph is a common substitution for f The popular theory that it is a portmanteau of password harvesting is an example of folk etymology.

Other definitions

International press references : Newspapers, TV, radios...