The different types of phishing attacks:
- Targeting a specific individual in an organisation with the purpose of stealing their login credentials is known as spear phishing. Before launching an attack, the attacker usually acquires information on the target, such as their name, position, and contact information.
- Vishing, which is short for 'voice phishing,' is when someone tries to steal information over the phone. The attacker may impersonate or represent a trusted friend or relative.
- In an email phishing scam, the attacker sends a legitimate-looking email with the intent of tricking the receiver into responding with information or visiting a website where the hacker can steal or sell their personal information.
- The target is sent an email with a link to a bogus website in an HTTPS phishing attack. The site might then be used to trick the victim into providing personal information.
- In a pharming attack, the victim's computer is infected with harmful code. The victim is then sent to a bogus webpage that collects their login details.
- To fool you into clicking, pop-up phishing generally utilises a pop-up claiming a problem with your computer's security or some other issue. You are then given the option of downloading a file, which turns out to be malware, or calling what appears to be a support centre.
Read More: What are the different methods of user authentication?