Cyber Security Awareness:Phishing and Different Types Of Phishing Attacks
Phishing is one of the technique, sometimes it's cost a lot for average defense spending is a lot.
Phishing caused to affect:
Exploitation on human
Identity theft
-SSN social security number
-Bank account
-Birth date
Phishing will done by "clever subject line", which will be main cause for loss of identity.
Different types of Phishing:
Phishing is a technique used by attacker which is a spray and pray technique to hoping to hit something simple, and requires less effort. They have their opportunity based on the victim greed.
Example of Phishing, section 49 criminal code 49-phishers ask for assistance in money, bank accounts in moving large sum of money.
Cat Phishing:
Cat Phishing is a technique luring someone into relationship by adopting a fictional online person's. This attack mostly done via online dating sites. The attack is more popular around valentines day.
Example for this attack, one mother and girl swindled thousands of dollars. Says that victims while presenting themselves as soldiers in Afghanistan.
Spear Phishing:
Spear Phishing is a technique of attack where a specific set of users and groups are targeted. The message we concern of this group. This type of Phishing is highly successful because of targeting specific groups.
Whaling :
Whaling is a targeted attack usually to upper management of organisation. It's not difficult to gather information about executives given press releases and information shared on sites like LinkedIn are useful for this type of attack.
Vishing:
Vishing is the use of telephone systems to commit fraud. Attacker try to get the Private information that will used for identity theft. These calls can be spoofed using VoIP to appear as from some one else.
Note: VoIP- voice over Internet protocol
Be always cautious of this fraudsters over Internet!!!
Hill Station view :
Phishing is one of the technique, sometimes it's cost a lot for average defense spending is a lot.
Phishing caused to affect:
Exploitation on human
Identity theft
-SSN social security number
-Bank account
-Birth date
Phishing will done by "clever subject line", which will be main cause for loss of identity.
Different types of Phishing:
- Phishing - spray & pray
- Cat Phishing
- Whaling
- Spear Phishing
- Vishing
Phishing is a technique used by attacker which is a spray and pray technique to hoping to hit something simple, and requires less effort. They have their opportunity based on the victim greed.
Example of Phishing, section 49 criminal code 49-phishers ask for assistance in money, bank accounts in moving large sum of money.
Cat Phishing:
Cat Phishing is a technique luring someone into relationship by adopting a fictional online person's. This attack mostly done via online dating sites. The attack is more popular around valentines day.
Example for this attack, one mother and girl swindled thousands of dollars. Says that victims while presenting themselves as soldiers in Afghanistan.
Spear Phishing:
Spear Phishing is a technique of attack where a specific set of users and groups are targeted. The message we concern of this group. This type of Phishing is highly successful because of targeting specific groups.
Whaling :
Whaling is a targeted attack usually to upper management of organisation. It's not difficult to gather information about executives given press releases and information shared on sites like LinkedIn are useful for this type of attack.
Vishing:
Vishing is the use of telephone systems to commit fraud. Attacker try to get the Private information that will used for identity theft. These calls can be spoofed using VoIP to appear as from some one else.
Note: VoIP- voice over Internet protocol
Be always cautious of this fraudsters over Internet!!!
Hill Station view :
https://valparaihillsheaven.blogspot.com/2019/?m=1
How to secure devices from cyber threats:
Https://viruscmd.blogspot.com
How to secure devices from cyber threats:
Https://viruscmd.blogspot.com
ReplyDeleteIf you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest
Email: cybergoldenhacker at gmail dot com