wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PHISHING

profile
Simran Butola
Aug 30, 2022
1 Like
0 Discussions
74 Reads

Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.121 As of 2020, phishing is by far the most common attack performed by Cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively.

 

The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995 however, it is possible that the term was used before this in a print edition of the hacker magazine 2600, The word is a leetspeak variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to "fish" for users' sensitive information.

 

Attempts to prevent or mitigate the impact of phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing awareness has become important at home and at the work place. For instance, from 2017 to 2020, phishing attacks have increased from 72% to 86% among businesses. 

 

 


Comments ()


Sign in

Read Next

note taker app

Blog banner

Expert System In AI

Blog banner

Pipedrive

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

(Input/Output) in os

Blog banner

Importance of Network Security Risk

Blog banner

Deadlocks in Operating System

Blog banner

Top 10 Logos and their meanings

Blog banner

PODIO

Blog banner

Virtual machine

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

IO Buffers

Blog banner

Spotify

Blog banner

Memory Management

Blog banner

IT security management

Blog banner

Memory Management

Blog banner

How to feel Happy everyday day

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Service Catalogue Management

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Uniprocessor scheduling

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Pandas Matrix Applications

Blog banner

Data Mining

Blog banner

Policies for Service Transition

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

What is a Malware ?

Blog banner

operating system

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Getting into Anime

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Memory Management Techniques

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Who decides your overthinking, anyway?

Blog banner

Linux VServer Architecture

Blog banner

UniProcessor Scheduling

Blog banner

Mobile Survey

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Some web vulnerabilities

Blog banner