wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

THE INPACT OF SOCIAL MEDIA!

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Web Site

Blog banner

Constrained Management in IT

Blog banner

child Labour

Blog banner

differentiate thinking humanly and rationally

Blog banner

Heart Fulness Meditation

Blog banner

How Does SSO Works

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

HR Automation : Need of the hour

Blog banner

File management In Operating System

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Modern operating system

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

My Favorite Sportsperson

Blog banner

Impact of social media on the human life

Blog banner

Odoo

Blog banner

Multiple processor scheduling

Blog banner

Operating Systems

Blog banner

Love is in air.....

Blog banner

Android Flashlight Application

Blog banner

Software

Blog banner

GraphQL

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

PYTHON

Blog banner

Evolution of Operating system.

Blog banner

Virtual Machine

Blog banner

TRAIN TRAVELING

Blog banner

Defining youtubr

Blog banner

Memory Management

Blog banner

Critical success factors

Blog banner

Travel: Everything Everywhere!

Blog banner

Blockchain in IoT Applications

Blog banner

I/O Management and Disk Scheduling

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Memory management

Blog banner