*DISCLAIMER BEFORE ACCESSING THE WEBSITE

The information contained in this website is for general information purposes only. The information is provided by Cyber Law Solution and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.

Phishing Attacks - Cyber Law Solution
Select Page

Phishing Attacks

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money) often for malicious reasons by disguising as a trustworthy entity in an electronic communication. It is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website the look of which are identical to the legitimate one and the only difference is the URL of the website in concern. Communications purporting to be from social web sites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that are infected with malware.
Phishing is an example of social engineering techniques used to deceive users, and exploit weaknesses in current web security and an attempt to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
Types of Phishing Attacks:-
1. Spear phishing
2. Clone phishing
3. Whaling
4. Link manipulation
5. Filter evasion
6. Website forgery

 

 

Pin It on Pinterest

Share This