Techversity Wiki
Advertisement
Stub
Stub
This article is a stub, an article too short to provide more than rudimentary information about a subject. You can help Techversity Wiki by expanding it

Phishing (pronounced like "fishing") is a cybercrime that involves the fraudulent use of electronic communications to dupe or scam a user into giving confidential information such as passwords, credit card information, and usernames.

Typically, the cybercriminal poses as a credible or legitimate institution such as a bank and employs social engineering to manipulate victims into clicking malicious links or attachments. If one were to fall victim to phishing, they could become a victim of identity theft and suffer financial losses.[Citation needed]

Methods of Phishing[]

There are at least three methods of phishing: spear phishing, clone phishing, and whaling.[1]

Spear phishing[]

Spear phishing is the act of sending malicious emails to a specific person. Criminals that do this have the name of the victim, their place of employment, their job title, their email address, and specific information about their job role.[2]

Clone phishing[]

Whaling[]

Smishing[]

Smishing is a form of phishing that involves the revelation of private information via a text or SMS message.[3]

Protecting Yourself[]

Though it is worth noting that hackers are constantly coming up with new techniques, there are some things that you can do to protect yourself and your organization:[4]

References[]

  1. What is Phishing? Attacks and Prevention Explored. Forcepoint. Retrieved 28 January 2022.
  2. Iriwn, Luke (24 March 2022). The 5 most common types of phishing attack. IT Governance Blog En. Retrieved 28 October 2022.
  3. Norton LifeLock Employee (18 January 2018). What is smishing?. Norton LifeLock. Retrieved 28 January 2022.
  4. What is Phishing?. Phishing.org. Retrieved 28 January 2022.
Advertisement