Phishing: the use of digital communications to trick people into revealing sensitive data or deploying malicious software
Phishing Kit: a collection of software tools needed to launch a phishing campaign
Smishing: the use of text messages to obtain sensitive information or to impersonate a known source
Vishing: the exploitation of electronic voice communication to obtain sensitive information or impersonate a known source
Spear Phishing: a subset of email phishing in which specific people are purposefully targeted, such as the accountants of a small business.
Whaling: a category of spear phishing attempts that are aimed at high-ranking executives in an organization.
Bluesnarfing;; exploiting bluetooth devices by establishing an unauthorized connection and retrieving sensitive information from them.
Pharming;; redirecting requests to fraudulent websites via DNS spoofing
Vishing;; a form of social engineering that uses VOIP to retrieve personal information from its victims
Watering hole attack;; when attackers target a specific group and exploits websites that the group commonly visits by injecting malicious code, users that visit the website will be automatically infected without their knowledge
Pretexting;; creating a fake scenario to elicit sensitive information from victims
Prepending;; when an attacker manipulates the caller ID to make it seem as if its calling from a trusted entity
Rootkit;; a type of malicious software that is installed by attackers to provide persistent and stealthy access to a system, they are used to manipulate system functions, files, intercept network traffic
Fileless virus;; malware that resides and executes within a system’s memory that does not leave a trace behind
Cryptomalware;; malicious software that is used to encrypt files on a user’s system, until a ransom is paid to the attacked.
Spyware;; malicious software that is used to gather information from a user’s device without their knowledge or consent