Author Name : Annamalai
Created date : 14-09-2020
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication.
What are examples of phishing?
Phishing Example: "Dear Email User" Expired Password Ploy An example of a common phishing ploy - a notice that your email password will expire, with a link to change the password that leads to a malicious website.
Email phishing - Most phishing attacks are sent by email. ...
Spear phishing - There are two other, more sophisticated, types of phishing involving email
Smishing and vishing
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
Prevention from Phishing :
Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer.
Impacts of Email Phishing:
Merely opening a phishing email and reading it will not affect your computer. Nor will accidentally downloading a . zip file that contains malware. It's only when you unzip the file and then open the document or program inside then you are likely compromised.
While traditional anti-spam solutions and secure email gateways are able to stop some phishing emails, there is still a significant number that makes it through to users' inboxes, leaving companies vulnerable to attack. ... Look Legitimate: Scammers have vastly improved their tactics and their emails look very realistic.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
Can phishing be done by text?
Scam artists know this and sometimes target consumers with “phishing” scams via text message or SMS (short message service). Text message or SMS phishing—also called “smishing”—occurs when scam artists use deceptive text messages to lure consumers into providing their personal or financial information.
Why is phishing dangerous?
Phishing is the ultimate social engineering attack, giving a hacker the scale and ability to go after hundreds or even thousands of users all at once. Phishing scams involve sending out emails or texts disguised as legitimate sources.