wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Impact of social media on the human life

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

BENIFITS OF YOGA

Blog banner

FIREWALL

Blog banner

Life lesson

Blog banner

An Overview of Virtual Machines

Blog banner

Virtual Machine's

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Life

Blog banner

IT Service as as Value Creation

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Microsoft powerpoint presentation

Blog banner

Firewall in Computer Network

Blog banner

How to feel Happy everyday day

Blog banner

Cache Memory

Blog banner

Process State

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Best password managers: Reviews of the top products

Blog banner

Deadlock and Starvation

Blog banner

Modern Operating Systems

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Modern operating system

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Buffering

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Yahoo! mail

Blog banner

Art and Culture of Rajasthan

Blog banner

Virtual Machine

Blog banner

IT security management

Blog banner

Service Design Principles

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

GIS

Blog banner

Operating System

Blog banner

Types of Threads

Blog banner

Use case of K-means clustering

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Balance

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner