As Computer Security consultant and Computer Forensics Investigator, I provide
a large scale of IT services for investigation, everywhere you are
In most cases, you don't have to move ...services are avalaible online, in several languages.
I perform data collections, computer forensic investigations, electronic discovery
strategies, and targeted audits to obtain informations or evidence .
From Wikipedia, the free encyclopedia
is a criminal activity using social engineering techniques.
Phishers attempt to fraudulently acquire sensitive information,
such as passwords and credit card details, by masquerading as a
trustworthy person or business in an electronic communication.
Phishing is typically carried out using email or an instant message,
although phone contact has been used as well.
Attempts to deal with the growing number of reported phishing
incidents include legislation, user training, and technical measures.
The first recorded mention of phishing is on
the alt.online-service.america-online Usenet newsgroup on January 2, 1996,
although the term may have appeared even earlier in the print edition
of the hacker magazine 2600.
The term phishing is a variant of fishing, probably influenced by phreaking,
and alludes to the use of increasingly sophisticated lures to "fish" for users'
financial information and passwords. The word may also be linked to
leetspeak, in which ph is a common substitution for f The popular
theory that it is a portmanteau of password harvesting is an example
of folk etymology.
International press references : Newspapers, TV, radios...