wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Linux Threads:

Blog banner

ProofHub

Blog banner

Smartsheet

Blog banner

File management

Blog banner

A book review

Blog banner

A buffer overflow

Blog banner

BITCOIN WALLET

Blog banner

Importance Of Time

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Threads

Blog banner

Delhi city

Blog banner

Concept and definition of m-commerce

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Embedded Operating System

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Virtual Memory

Blog banner

RAID

Blog banner

bulk email software

Blog banner

Virtual Machine

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Fault Tolerance

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Topic: Sessions in Operating system

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Metasploit

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

RAID

Blog banner

Importance Of Education.

Blog banner

Modern Operating System

Blog banner

How Does SSO Works

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Access management

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Game via listing method

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

FILE SHARING

Blog banner

GraphX:- A graph processing tool

Blog banner

gis substation

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner