1 / 1

3 Main Types of Phishing Attacks!

Learn About the Many Ways in Which Phishing Can Bait and Hurt You! What makes people so vulnerable to phishing, and how can one identify and thwart a phishing attack on them.

Download Presentation

3 Main Types of Phishing Attacks!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 3MAINTYPESOFPHISHING ATTACK Learn About the Many Ways in Which Phishing Can Bait and Hurt You! What makes people so vulnerable to phishing, and how can one identify and thwart a phishing attack on them. Spear Phishing To personalize the phishing attack, hackers do enough research into the business or individual that are on their radar. They find out various details & On the basis of this research, hackers send customized phishing emails to the target, impersonating someone that the target knows and hence would trust. Whaling Attack Whaling attack and spear phishing attack are similar to each other in concept, but differ in the kind of users that each targets. Hackers rely on whaling attack to target the big guns within an organization, the likes of CEO, director, or any other executive. Clone Phishing In clone phishing hackers choose their targets carefully and not randomly. The perpetrator would take a legit email (containing attachment) that has already been delivered once to their target and prepare an almost exact copy of this email. Click here to read more in details about Types of Phishing Attack

More Related