What are the different types of phishing?

Spear phishing
Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.Clone phishing
Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.Whaling
Several phishing attacks have been directed specifically at senior executives and other high-profile targets within businesses, and the term whaling has been coined for these kinds of attacks.Link manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organizationFilter evasion
Phishers have even started using images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails.Website forgery
An attacker can even use flaws in a trusted website's own scripts against the victim.[26] These types of attacks (known as cross-site scripting) are particularly problematic.Covert redirect
Covert redirect is a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website.Social engineering
Users can be encouraged to click on various kinds of unexpected content for a variety of technical and social reasons.Phone phishing
Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accountscourtesy: https://en.wikipedia.org/wiki/Phishing
Blogger: https://aywenz.blogspot.in/ Facebook: https://www.facebook.com/aywenzit/
Comments
Post a Comment