Phishing attacks are deceptive cybercrimes where criminals impersonate trusted sources—like banks or service providers—via emails, texts, or fake websites to trick individuals into revealing sensitive information such as usernames, passwords, or financial details.
Fraudsters send emails that appear to be from reputable companies or individuals. Victims are prompted to click on malicious links, download malware-infected attachments, or provide sensitive information.
A sophisticated form of spear phishing targeting high-profile individuals like executives or government officials. Emails are crafted to appear official, often mimicking internal communications.
A targeted form of phishing that uses personalized information about the victim. Attackers often gather details from social media profiles or previous data breaches.
Phishing attacks conducted via SMS text messages. Victims receive texts prompting them to click on links or call fraudulent phone numbers.
Voice phishing attacks conducted via phone calls. Attackers impersonate bank representatives, government officials, or tech support.
Attackers clone a legitimate email and resend it with malicious links or attachments. The cloned email appears to be from a trusted source.
A technique where attackers redirect victims to a fake website, even if the correct URL is entered. Achieved through DNS poisoning or compromise.
Scammers create fake social media profiles or pages to lure victims into providing personal information. Common tactics include fake giveaways, friend requests, or job offers.