Phishing: Difference between revisions
No edit summary |
No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Phishing_Icon.svg|frameless|40px|link= | | style="width: 50%; vertical-align: top;" colspan="2" | [[File:ACT_Phishing_Icon.svg|frameless|40px|link=Phishing]] <big>'''Introduction'''</big> <br> | ||
'''Phishing''' is a malicious [[Social Engineering]] technique used by cybercriminals to deceive individuals and organizations into revealing sensitive information, such as login credentials, financial data, or personal details. Phishing attacks often take the form of fraudulent emails, websites, or messages that appear to be from legitimate sources but are designed to trick recipients into taking harmful actions. | '''Phishing''' is a malicious [[Social Engineering]] technique used by cybercriminals to deceive individuals and organizations into revealing sensitive information, such as login credentials, financial data, or personal details. Phishing attacks often take the form of fraudulent emails, websites, or messages that appear to be from legitimate sources but are designed to trick recipients into taking harmful actions. | ||
Line 12: | Line 12: | ||
* '''Vishing (Voice Phishing)''': Cybercriminals use phone calls to impersonate trusted entities and manipulate victims into revealing confidential data. | * '''Vishing (Voice Phishing)''': Cybercriminals use phone calls to impersonate trusted entities and manipulate victims into revealing confidential data. | ||
| style="width: 30%; vertical-align: top;" colspan="1" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]] | | style="width: 30%; vertical-align: top;" colspan="1" | [[File:stalking-hyenas.png|frameless|100px|right|link=Top_Threats]] | ||
<strong>Cybersecurity Tools</strong> | |||
{{#categorytree:Phishing|mode=collapsed}} | |||
{{#categorytree:Anti-virus & Anti-malware Software|mode=collapsed}} | |||
{{#categorytree:Security Awareness & Training|mode=collapsed}} | |||
{{#categorytree:Phishing|mode= | |||
{{#categorytree: | |||
{{#categorytree:Security Awareness & Training|mode= | |||
|- | |- | ||
| style="width: 20%; vertical-align: top;" | <big>'''Motives'''</big><br> | | style="width: 20%; vertical-align: top;" | <big>'''Motives'''</big><br> |
Latest revision as of 19:09, 30 October 2023
Introduction Phishing is a malicious Social Engineering technique used by cybercriminals to deceive individuals and organizations into revealing sensitive information, such as login credentials, financial data, or personal details. Phishing attacks often take the form of fraudulent emails, websites, or messages that appear to be from legitimate sources but are designed to trick recipients into taking harmful actions. Phishing attacks are a common and serious threat to cybersecurity. These attacks exploit human psychology and trust in familiar brands or institutions to manipulate victims into divulging confidential information or performing actions that compromise their security. Phishing can take various forms, including:
|
Cybersecurity Tools no subcategories no subcategories no subcategories | |
Motives The motives behind phishing attacks can vary, but they often include:
|
Prevention and Mitigation Preventing phishing attacks requires a combination of technical defenses and user awareness: Technical Defenses
User Awareness
|
Notable Incidents Several high-profile phishing incidents have had significant consequences, including data breaches, financial losses, and reputational damage:
|
Conclusion |