Cybercriminals send emails pretending to be someone they are not to many people at the same time. The email can claim to come from a bank, company, government department or any other widely used online service. The aim is to get the target to do something they usually wouldn't or reveal personal information.
Emails often request login details for websites with financial information such as internet banking sites. This may be in the form of a security alert asking you to confirm your account details for example.
Some of the signs to look out for when trying to detect a phishing email.
View more real examples of phishing emails here:
Cybercriminals send emails pretending to be someone they are not to many people at the same time. The email can claim to come from a bank, company, government department or any other widely used online service. The aim is to get the target to do something they usually wouldn't or reveal personal information.
​
Emails often request login details for websites with financial information such as internet banking sites. This may be in the form of a security alert asking you to confirm your account details for example.
​
​
​
Cybercriminals send emails pretending to be someone they are not to many people at the same time. The email can claim to come from a bank, company, government department or any other widely used online service. The aim is to get the target to do something they usually wouldn't or reveal personal information.
​
Emails often request login details for websites with financial information such as internet banking sites. This may be in the form of a security alert asking you to confirm your account details for example.
The most common types of phishing attacks are deceptive phishing attacks. These are when an attacker impersonates a legitimate company and attempt to steal people’s personal information or login credentials. These often use threats and a sense of urgency to scare users into giving their details away. This type of attacks success relies on how closely the attack email resembles a legitimate company’s official correspondence. As a result, users should look at URLs carefully to see if they redirect to an unknown website. They should also look out for email’s addressed generically, grammar mistakes and spelling errors.
Spear phishing attacks have the same goal as a deceptive phishing attack, they obtain specific information about an individual and use this to try and trick the recipient into believing they have a connection with the sender, from here the goal is the same as deceptive attack.
This sort of attack is a specific type of spear phishing attack with the intention of getting a top executive in a company in an attempt to steal their login credentials. In the event that their attack proves successful, fraudsters can choose to conduct CEO fraud the second phase of a business email compromise.
Pharming is essentially phishing without a lure. It is a scamming practice where some malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. E.g. you are trying to access www.example.com and it sends you to www.fakeExample.com. The code that has compromised the computer will always take the user to the fake website even if the correct website is typed in to the browser.