Building a Digital Defense Against Phishing and Spear Phishing Attacks
Posted over 5 years ago by Naufil Mirsinge
Post a topicPeople who like this
Delete Comment
This post will be deleted permanently. Are you sure?
Code Snippet
Html
Html
Css
JavaScript
Sass
Xml
Ruby
PHP
Java
C#
C++
ObjectiveC
Perl
Python
VB
SQL
Generic Language
Let’s start with “phishing”.
There are many different types of fishing: deep sea fishing, ice fishing, fly fishing… you get the point. But today, we want to talk about phishing with a “ph”—and the related problem of “spear phishing.”
Phishing is when a fraudster sends you texts, emails, or other messages with the intent of tricking you into responding in some way. He will often include a malicious attachment or link in the message. If you open the attachment or click on the link, the scammer can gain access to your device.
From there, the possibilities are endless. He can install ransomware that will lock you out of your computer. He can steal your data or install software that allows him to track all of your activity, including the passwords you enter. He can gain access to your bank accounts, credit cards, and the most personal info you have stored.
Spear phishing is a more personalized version of the same scam. In this case, instead of receiving an email from a random individual, the scam artist will send you a personalized message that appears to come from a trusted source. It could look as though it comes from a friend, a business partner, a social media acquaintance, or even your bank. There are many variations of the scam, but the scam artist will often tell you a story to trick you into giving up your private information. For example, the fraudster may:
So what are the warning signs of such scams?
What can you do?
0 Votes
0 Comments
Login or Sign up to post a comment