Stub
This article is a stub, an article too short to provide more than rudimentary information about a subject. You can help Techversity Wiki by expanding it
|
Phishing (pronounced like "fishing") is a cybercrime that involves the fraudulent use of electronic communications to dupe or scam a user into giving confidential information such as passwords, credit card information, and usernames.
Typically, the cybercriminal poses as a credible or legitimate institution such as a bank and employs social engineering to manipulate victims into clicking malicious links or attachments. If one were to fall victim to phishing, they could become a victim of identity theft and suffer financial losses.[Citation needed]
Methods of Phishing[]
There are at least three methods of phishing: spear phishing, clone phishing, and whaling.[1]
Spear phishing[]
Spear phishing is the act of sending malicious emails to a specific person. Criminals that do this have the name of the victim, their place of employment, their job title, their email address, and specific information about their job role.[2]
Clone phishing[]
Whaling[]
Smishing[]
Smishing is a form of phishing that involves the revelation of private information via a text or SMS message.[3]
Protecting Yourself[]
Though it is worth noting that hackers are constantly coming up with new techniques, there are some things that you can do to protect yourself and your organization:[4]
References[]
- ↑ What is Phishing? Attacks and Prevention Explored. Forcepoint. Retrieved 28 January 2022.
- ↑ Iriwn, Luke (24 March 2022). The 5 most common types of phishing attack. IT Governance Blog En. Retrieved 28 October 2022.
- ↑ Norton LifeLock Employee (18 January 2018). What is smishing?. Norton LifeLock. Retrieved 28 January 2022.
- ↑ What is Phishing?. Phishing.org. Retrieved 28 January 2022.