Buy 2FA-MFA Security Keys | Ongoing Promo: Free Shipping

TheSecurityKey.com

  • Shop
  • Brands
    • Yubico
    • Ensurity
    • Thetis
    • Feitian
    • AuthenTrend
  • About
  • Enterprise
  • Influencers
  • FAQs
  • Blog
  • Contact
COMPARE
  • No products in cart.
  • Home
  • Uncategorized
  • What is Phishing?

What is Phishing?

by WebbleGum / Sunday, 21 February 2021 / Published in Uncategorized

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details or other sensitive details, by impersonating oneself as a trustworthy entity in a digital communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.

Phishing is an example of social engineering techniques used to deceive users. Users are lured by communications purporting to be from trusted parties such as social networking websites, auction sites, banks, mails/messages from friends or colleagues/executives, online payment systems or IT administrators.

Types of Phishing

  • Spear phishing and whaling
  • Catphishing and catfishing
  • Clone phishing
  • Voice phishing
  • SMS phishing

Popular Phishing Techniques

  • Link manipulation
  • Filter evasion
  • Website forgery
  • Covert redirect
  • Social engineering
  • Tabnabbing

How to Prevent Phishing?

  • Multi-factor authentication (for example, use of security tokens)
  • Filtering out phishing mail
  • Browsers alerting users to fraudulent websites
  • Augmenting password logins
  • Monitoring and takedown
  • Transaction verification and signing
  • Email content redaction
  • Limitations of technical responses

About WebbleGum

Strategy consulting and guest writing at TheSecurityKey.com

What you can read next

How MrGamerJay’s YouTube channel got hacked
How to protect your login credentials from getting stolen?
How can organizations prevent identity theft?

You must be logged in to post a comment.

Search

Recent Posts

  • How can organizations prevent identity theft?

  • Secure login with FIDO2 explained

  • What is fingerprint authentication?

  • iAmarsingh explains how to secure a YouTube channel

  • Sharmaji Brothers Explain How To Protect YouTube, Facebook, Twitter Accounts From Hacking

  • What is NFC and its use in security tokens?

  • What is biometric security?

  • How to protect your login credentials from getting stolen?

  • Why Should Companies Go Passwordless?

  • Competition Boss explains the concept of Security Key

WHY US?

We're one-stop shop for security keys and security tokens. With a solid track record, we're also preferred partners of several global OEMs.

GET A KEY

Buy security
keys and
security tokens

SHOP NOW

CORPORATE

  • About Us
  • Contact Us
  • T&C, Privacy, Copyright
  • Cancellation and Refund
  • Influencers and Affiliates

SUPPORT

  • support@thesecuritykey.com
  • WhatsApp us

© TheSecurityKey.com
All Rights Reserved
Powered by WebbleGum

TOP
Show
Hide
  • WhatsApp