wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Women empowerment

Blog banner

VIRTUAL MEMORY

Blog banner

Risk factors in service transistion

Blog banner

Understanding Mobile Device Forensics

Blog banner

INTERRUPTS

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

An Overview of Virtual Machines

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

LIFEHACKER

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Animal’s have my heart

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Hacking

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Cybersecurity Standards for Automotive

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Development Of Modern Operating System

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Cache memory

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Fashion marketing in india

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

memory cache

Blog banner

What is a Dumpster Diving Attack?

Blog banner

1.1 basic elements

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

How I use google in my daily life

Blog banner

Multicore and multithreading 171

Blog banner

A little bit of salt is all the hash needs!

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

OS Assignment 3

Blog banner

Deming’s Process

Blog banner

Deadlock

Blog banner

Firewall

Blog banner

Webmail

Blog banner