This method is often used in form applications that are originally produced for the use of businesses and individuals. Making the victim hand over his / her sensitive information by trying to trick the user into revealing information data such as usernames, passwords by using which the attacker can reach a system or the victim’s accounts. These are either making someone hand over his / her sensitive information or making someone download malware in his / her device. Usually, a phishing campaign intent to make the victim do one of two things. One way to categorize phishing activities is by the “purpose” of the phishing activity. However, we can sum up the most common purposes of phishing under some categories. What are the types of phishing?Īs we mentioned before, various types of phishing exist and they are used to sell somebody the Brooklyn bridge. The attacker can perform various harmful operations using this method such as gathering personal information and account information of the victims. The attacker who uses this method tries to distribute malevolent links and attachments via his phishing e-mails. Phishing is a method of gathering personal information by using fake e-mails and websites. The word “Phish” is pronounced similar to “Fish” which is almost like throwing a baited hook and hoping the victim bites it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |