wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Ola

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

PERSONAL STORIES

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Virtual Memory

Blog banner

Data Security must be your Priority!

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Hello World

Blog banner

What is thread and multithreading ?

Blog banner

Data Warehousing

Blog banner

Operating system

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

MY FIRST BLOG?

Blog banner

GIS Mapping

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

GIS Topography

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Deadlock and starvation

Blog banner

Mumbai Metro 3

Blog banner

Paginng In OS

Blog banner

Big Data Architecture

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

OS ASSIGNMENT

Blog banner

RAID_142

Blog banner

Indian Culture and Tradition

Blog banner

Memory Management in Operating System

Blog banner

WORKFRONT SOFTWARE

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Explain DBMS in Brief

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

I/O Management and Disk Scheduling

Blog banner

Firewall

Blog banner

Memory management

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Principles of Service Operation

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Operating system evolution

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner