Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers
2
New cards
Voice Phishing
phone-based attack in which the attacker deceives victims into divulging personal or financial information
3
New cards
Vishing
phone-based attack in which the attacker deceives victims into divulging personal or financial information
4
New cards
SMS Phishing
Attack that uses text messages to deceive individuals into sharing their personal information
5
New cards
Smishing
Attack that uses text messages to deceive individuals into sharing their personal information
6
New cards
Spear Phishing
Used by cybercriminals who are more tightly focused on a specific group of individuals or organizations
7
New cards
Whaling
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
8
New cards
BEC
Business Email Compromise
9
New cards
Business Email Compromise
Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker