Monday, 25 November 2024

Complete Guide to Phishing: Techniques & Mitigations

 We are highly thankful to AM green HRD given wonderful training to boost integrated management system.- Information security management system .


 Complete Guide to Phishing: Techniques & Mitigations - Information technology (IT) phishing is a cyberattack that involves tricking people into sharing sensitive information, such as banking or credit card details, through electronic communication. Phishing is a type of social engineering attack where the attacker impersonates someone else to gain the victim's trust. 

Some types of phishing include:

Spear phishing

A targeted email attack where the attacker impersonates someone the victim knows, such as a colleague or boss. Spear phishing attacks are often well-researched and can involve infiltrating an organization to steal data. 

Whaling

A spear-phishing attack that targets high-level executives or other privileged users within a business. Whaling attacks often use content that is likely to grab the victim's attention, such as a legal subpoena or an email request from an executive. 

Smishing

A text-based phishing attack where the attacker sends a fake text message to trick the victim. Smishing attacks can involve the attacker posing as the victim's wireless provider, the US Postal Service, or another shipping company. 

Vishing

A phone-based phishing attack where the attacker makes a call to the victim. Vishing attacks can involve the attacker using caller ID spoofing to make their calls appear to come from a legitimate organization.

No comments:

Post a Comment