wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Mesh Topology

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Data Analytics in Data Science

Blog banner

Direct Memory Access

Blog banner

'Positivity in life'

Blog banner

Webmail

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Go Daddy

Blog banner

Life

Blog banner

"Mahakali cave"

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Memory Management

Blog banner

KAHAWA TEA

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Memory Management

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Depression

Blog banner

Components of GIS

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Pandas Matrix Applications

Blog banner

Malware

Blog banner

Online Education

Blog banner

memory management

Blog banner

Outlook.com

Blog banner

Mutual exclusion

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

S-Tool : Steganography

Blog banner

Sage business cloud accounting

Blog banner

Pink sauce pasta

Blog banner

FASHION

Blog banner

Dekkers Algorithm

Blog banner

PYTHON

Blog banner

Use case of K-means clustering

Blog banner

OS Assignment 1

Blog banner

Cyber Forensics

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

HubSpot

Blog banner

Virtual memory

Blog banner

Threads

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Evolution of Operating Systems

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner