Phishing: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson No edit summary |
imported>Doug Williamson (Add link.) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 13: | Line 13: | ||
The name 'phishing' is a grim joke variant on 'fishing'. | The name 'phishing' is a grim joke variant on 'fishing'. | ||
== See also == | == See also == | ||
*[[Advanced Persistent Threat]] | |||
* [[BEC]] | * [[BEC]] | ||
* [[Cybercrime]] | * [[Cybercrime]] | ||
Line 22: | Line 22: | ||
* [[Hacktivist]] | * [[Hacktivist]] | ||
* [[Internet]] | * [[Internet]] | ||
*[[Smishing]] | |||
*[[Social engineering]] | |||
* [[Spear phishing]] | * [[Spear phishing]] | ||
* [[Spoofing]] | * [[Spoofing]] | ||
*[[Vishing]] | |||
* [[Whaling]] | * [[Whaling]] | ||
Latest revision as of 18:40, 17 November 2022
Cybercrime.
Phishing is an email-based fraud.
The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Most common attacks
- "The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
- Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.
The name 'phishing' is a grim joke variant on 'fishing'.