What is Phishing
According to IBM, phishing attacks are fraudulent emails, text messages, phone calls or web sites designed to trick users into downloading malware, sharing sensitive information or personal data (e.g., Social Security and credit car ... Read Full Article
As users become wiser to traditional phishing scams, some fraudsters are abandoning the idea of “baiting” their victims entirely. Instead, they are resorting to Pharming. This method of phishing leverages cache poisoning against the domain name s ... Read Full Article
Vishing is not the only type of phishing that digital fraudsters can perpetrate using a phone. They can also conduct what is known as smishing. This method leverages malicious text messages to trick users into clicking on a malicious link or handing ... Read Full Article
Until now, we have discussed phishing attacks that for the most part rely solely on email as a means of communication. Email is undoubtedly a popular tool among phishers. Even so, fraudsters do sometimes turn to other media to perpetrate their attack ... Read Full Article
Whaling attacks commonly make use of the same techniques as spear phishing campaigns. Here are a few additional tactics that malicious actors could use:
Infiltrate the network: A compromised executive’s account is more effective than a spoofed e ... Read Full Article