INTERNET SECURITY DEFENDS
Phishing is one of the oldest types of cyberattacks that can
lead to online banking fraud, and it remains one of the most
dangerous virus that affects our internet security: almost a
third of all breaches in the past year were related to phishing,
according to a 2019 Verizon report.
And lately, much of the debate surrounding the significant rise
in coronavirus-related scams has to do with phishing.
How Much Do We Really Know About Phishing?
We dove deep into the history of phishing, to learn about the
most common types of phishing campaigns to watch out for
now, and to learn how to protect against them.
Phishing attacks are the fraudulent attempt to obtain sensitive
and personally identifiable information (PII) from companies or
the general public. Examples of PII are user names,
passwords, and credit card information. Violators often
disguise themselves online by acting as a trusted entity,
persuading their victims to turn over their information.
Social Engineering Techniques Used In Phishing
The main thing to keep in mind with phishing campaigns is
that they are a social engineering technique that goes to the
extreme of real private detective work to prepare phishing
campaigns against company managers or CEOs (spear
phishing) to make them sting.
This means that the scammer is deliberately using something
to lure his victims, whether it's a link on a web page to a fake
news story designed to generate outrage, or a fake email
posing as the victim's bank, which they are encouraged to
click on a link that leads to a website controlled by the
Types of Phishing
Here are some types of phishing and examples of how they
would work in practice:
Vishing / Smishing: These are two examples of phishing
vectors. Vishing refers to "voice phishing", where social
engineering is implemented through a telephone system, with
a scammer trying to convince the victim to transfer money
from their bank account or to hand over PII, jeopardiz