Like Us On Facebook

Get Free Instant Access To The Latest Tricks And Hacks Latest Updates,Enter your email below.

PS : We Hate Spamming Too ! You Are Safe With Us.
Breaking News
recent

Infographics -- Basics Of Phishing Attacks And How It Works!!!

Infographic -- How Phishing Attack Works?
 Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. (Source : Wikipedia).

In simple terms, phishing means making people fool and steal their username, password, credit card numbers etc..

A phishing technique was described in detail in 1987, and (according to its creator) the first recorded use of the term "phishing" was made in 1995.(Source : Wikipedia)

List of phishing techniques:
  • Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • Spear Phishing
Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.
  • Clone Phishing
A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a re-send of the original or an updated version to the original.

    This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.
  • Whaling
Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks. (Source : Wikipedia)

Here is the infographic about How  Phishing Attack Works.
Infographic -- How Phishing Attack Works?

Now a days most of the attackers are targeting social networking sites like Facebook, Twitter etc. And most basic and important tips that will save you from these phishing attacks are:
  • Never share your passwords and bank details with anyone.
  • Don't log into pages directly linked via emails.
 You can enter the URLs manually. Beware of Phishing Attack, and if you care about your social networking sites like Facebook and Twitter and about your friends, then just share this post to your friends to be secure.
Omkar Fatale

Omkar Fatale

No comments:

Post a Comment

Post comments only relevant to the topic. Do not spam. Comment must be meaningful and must add to the conversation. Comments containing more than 1 link will be deleted.

Recent Comments

Recent Comments Widget
Powered by Blogger.