wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Service Strategy In ITSM

Blog banner

How to Conquer Depression ?

Blog banner

Memory Management

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

RAID

Blog banner

Memory management

Blog banner

What is a Malware ?

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Google

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

A Journey By Train

Blog banner

VIRUS

Blog banner

Water Resources are about to exhaust...

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Emotional Suppression: The Hidden Costs Of Unfelt Feelings

Blog banner

NETWORK SECURITY RISKS

Blog banner

Remote Work in 2026

Blog banner

IoT Evolution

Blog banner

Business Engineering

Blog banner

Getting into anime My anime suggestions

Blog banner

Dr. Venkadavarahan

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

File system

Blog banner

Importance of business process documentation

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Virtual Memory

Blog banner

Race Condition in Operating Theatre

Blog banner

VPN

Blog banner

Multiple processor scheduling

Blog banner

Never give up

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

LiquidPlanner

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Kafka - A Framework

Blog banner

Deadlock and starvation in operating system

Blog banner

RAID - LEVELS OF RAID

Blog banner

Social media

Blog banner

DBMS and various career options related to it.

Blog banner

Music

Blog banner