A detailed walk through phishing attacks, user education and test!
Email Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
There are many type of phishing, some of these include:
Attackers may gather personal information about their target to increase their probability of success.
Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
Several phishing attacks have been directed specifically at senior executives and other high-profile targets within businesses, and the term whaling has been coined for these kinds of attacks.
This is place holder text, and purely that only. This is place holder text, and purely that only.
This is place holder text, and purely that only:
<this will be code>
This will be an explaination
This is place holder text, and purely that only.
This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only.
This is place holder text, and purely that only:
This is place holder text, and purely that only.
This is place holder text, and purely that only.
This is place holder text, and purely that only.
This is place holder text, and purely that only. This is place holder text, and purely that only.
Below is 'The Phishing Test' which allows users to test their skills (some of which are new) from the above content, however some things to note before starting:
We have removed all dangerous aspects of this test by screen shotting real world emails, there is a mixure of real phishing attacks and also legitimate emails.
In the screen shots we have hovered over relevant links to assist with your detirmination of the email legitimacy.
The attacker can insert a fake login form into the page using DOM manipulation, set the form's action
attribute to target his own server, and then trick the user into submitting sensitive information.
This is place holder text, and purely that only.
This is place holder text, and purely that only.
This is place holder text, and purely that only.
This is place holder text, and purely that only.