PHISH
PHISHING




PHISHING

WHAT IS PHISHING?

PHISHING LINKS



BACK TO TOP



SECTION 1



PHISHING




Phishing is a type of social engineering where an attacker sends a
fraudulent (e.g., spoofed, fake, or otherwise deceptive) message
designed to trick a person into revealing sensitive information to
the attacker or to deploy malicious software on the victim's
infrastructure like ransomware.



Phishing
https://en.wikipedia.org/wiki/Phishing



BACK TO TOP



SECTION 2



WHAT IS
PHISHING?




Phishing attacks aim to steal or damage sensitive data by deceiving
people into revealing personal information like passwords and credit
card numbers.



Different types of phishing attacks

Phishing attacks come from scammers disguised as trustworthy sources
and can facilitate access to all types of sensitive data.

As technologies evolve, so do cyberattacks. Learn about the most
pervasive types of phishing.



Email phishing

The most common form of phishing, this type of attack uses tactics like
phony hyperlinks to lure email recipients into sharing their personal
information. Attackers often masquerade as a large account provider
like Microsoft or Google, or even a coworker.



Malware phishing

Another prevalent phishing approach, this type of attack involves planting
malware disguised as a trustworthy attachment (such as a resume or bank
statement) in an email. In some cases, opening a malware attachment can
paralyze entire IT systems.



Spear phishing

Where most phishing attacks cast a wide net, spear phishing targets specific
individuals by exploiting information gathered through research into their
jobs and social lives. These attacks are highly customized, making them
particularly effective at bypassing basic cybersecurity.



Whaling

When bad actors target a “big fish” like a business executive or celebrity,
it’s called whaling. These scammers often conduct considerable research into
their targets to find an opportune moment to steal login credentials or other
sensitive information. If you have a lot to lose, whaling attackers have a
lot to gain.



Smishing

A combination of the words “SMS” and “phishing,” smishing involves sending
text messages disguised as trustworthy communications from businesses like
Amazon or FedEx. People are particularly vulnerable to SMS scams, as text
messages are delivered in plain text and come across as more personal.


Vishing

In vishing campaigns, attackers in fraudulent call centers attempt to trick
people into providing sensitive information over the phone. In many cases,
these scams use social engineering to dupe victims into installing malware
onto their devices in the form of an app.



What is phishing?
https://www.microsoft.com/en-us/security/business/security-101/what-is-phishing?



A Profitless Endeavor:
Phishing as Tragedy
of the Commons

https://www.microsoft.com/en-us/research/wp-content/uploads/2008/09/PhishingAsTragedy.pdf




Top 10 Best Free
Anti-Phishing
Protection (2022)

https://www.antivirussoftwareguide.com/best-anti-phishing-software




BACK TO TOP



SECTION 3



PHISHING
LINKS




APWG
https://apwg.org/

Between Two Alerts Phishing
Emails — Don’t Get Reeled In!

https://www.splunk.com/en_us/form/phishing-emails-dont-get-reeled-in.html

The Center for Identity Management
and Information Protection, CIMIP

https://www.utica.edu/academic/institutes/cimip//index.cfm

The Impact of Incentives on
Notice and Take-down

https://www.cl.cam.ac.uk/~rnc1/takedown.pdf

Phish Tank
https://www.phishtank.com/

What Is Phishing?
https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html

What Is Phishing?
https://www.malwarebytes.com/phishing

What is Phishing? Threat Types,
Scams, Attacks & Prevention

https://www.phishprotection.com/resources/what-is-phishing/



BACK TO TOP



Linktionary
http://www.linktionary.com/




Techopedia
https://www.techopedia.com/




microformats wiki
http://microformats.org/wiki/Main_Page




Code
https://code.org/




A Comprehensive
Guide to
Website Management

https://www.webalive.com.au/website-management/




BACK TO TOP



HOME

COMPUTER-INDEX PAGE

E-MAIL



BACK TO TOP