Phishing
A type of cybercrime involving fraudulent attempts to obtain sensitive information
Template:Infobox cybersecurity
Phishing is a form of cybercrime where attackers attempt to deceive individuals into providing sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communications. Phishing is typically carried out by email spoofing, instant messaging, and text messaging, and it often directs users to enter personal information at a fake website that matches the look and feel of the legitimate site.
History[edit | edit source]
The term "phishing" is a variant of "fishing," likely influenced by the idea of "fishing" for a victim by luring them with a bait. The first recorded mention of phishing was in the mid-1990s, when hackers used AOL to steal user information. As the internet expanded, so did the prevalence and sophistication of phishing attacks.
Techniques[edit | edit source]
Phishing techniques have evolved over time, becoming more sophisticated and harder to detect. Some common techniques include:
Email Phishing: The most common form of phishing, where attackers send emails that appear to be from legitimate companies, often including a sense of urgency to prompt immediate action.
Spear Phishing: A more targeted form of phishing where attackers customize their messages based on information they have gathered about the victim, making the attack more convincing.
Whaling: A type of spear phishing that targets high-profile individuals such as executives or other senior members of an organization.
Vishing: Phishing conducted over the phone, where attackers impersonate legitimate entities to extract sensitive information.
Smishing: Phishing via SMS, where attackers send text messages that appear to be from legitimate sources, often containing a link to a fraudulent website.
Prevention[edit | edit source]
Preventing phishing attacks involves a combination of technology and user education. Some strategies include:
Email Filtering: Using advanced email filtering systems to detect and block phishing emails before they reach the user.
User Education: Training users to recognize phishing attempts, such as checking the sender's email address, looking for grammatical errors, and being cautious with links and attachments.
Two-Factor Authentication (2FA): Implementing 2FA to add an extra layer of security, making it harder for attackers to gain access even if they obtain a user's credentials.
Security Software: Using up-to-date antivirus and anti-malware software to detect and block malicious activities.
Impact[edit | edit source]
Phishing attacks can have severe consequences for individuals and organizations, including financial loss, identity theft, and damage to reputation. According to various reports, phishing is one of the most common and damaging forms of cybercrime, with billions of dollars lost annually.
Also see[edit | edit source]
Search WikiMD
Ad.Tired of being Overweight? Try W8MD's physician weight loss program.
Semaglutide (Ozempic / Wegovy and Tirzepatide (Mounjaro / Zepbound) available.
Advertise on WikiMD
WikiMD's Wellness Encyclopedia |
Let Food Be Thy Medicine Medicine Thy Food - Hippocrates |
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian
Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates Wikipedia, licensed under CC BY SA or similar.
Contributors: Prab R. Tumpati, MD