What Is Phishing and How to Protect
Yourself from It | Total Security
Did you get an email from a fictitious " Nigerian Prince " who has so much wealth he has
hidden somewhere, but does he need your help to get it back? Incidentally, this phishing
scam is one of the longest-running scams online, and it still gets you over $ 700,000 every
This is just one of the many examples of phishing attempts by hackers and other cyber
criminals when trying to obtain personal or sensitive information from people who are not
Phishing attacks are common, but there is a more targeted type known as spear phishing.
We'll explain what it is, how it works, and how you can prevent such an attack.
What is phishing
Generally speaking, phishing comes in various forms, including phishing social media
messages or fraudulent emails, etc., with a link to a fake website decorated with malicious
code and many more threats. The main goal of the attacker is to get you to click on the link
and write your details to him to steal or completely download malware.
These days, phishing attempts are much more sophisticated as sites equipped with malware,
and other threats look and function almost the same way as the real sites you visit.
Spear phishing one of these complex and targeted attacks that are very targeted to specific
individuals or companies.
Attackers gather sensitive and personal information about their targets, which increases the
likelihood of success with their plan.
How does phishing behave
Phishing differs from other forms of phishing because in this case the perpetrator already has
some direct information about the target before attacking it.
Fraudsters are trusted parties and entice you to share your personal or sensitive information
with them. It is not difficult for anyone to discover information about you online, especially
from social media.
With your details close at hand, for example, your residential, tax, or workplace details,
perpetrators will try to convince you t