Phishing refers to sending emails that appear to come from trusted sources, but in reality aim to manipulate the recipient to steal sensitive information.
How Phishing Works
Most phishing attacks begin with receiving an email or direct message in which the sender impersonates a real company or other organization in order to trick the recipient. This email includes links to a website prepared by the criminals – which imitates that of the legitimate company – and in which the victim is invited to enter their personal data.
In this sense, there is a link between spam and phishing, as fraudulent emails are often sent en masse to multiply the number of potential victims of hackers. E-mail continues to be the most used means by cybercriminals for this type of fraud, phishing can use other means of communication: attempts via SMS (sometimes called smishing), VoIP (vishing) or instant messages on social networks are frequent.
How to recognize a phishing message
How to Protect Yourself Against Phishing
Source: https://www.pandasecurity.com/es/security-info/phishing/
At Itera we can help you.
Contact a specialist: seguridad@iteraprocess.com
Related posts
Casos de éxito