Related Articles
Spear Phishing
Phishing attempts directed at specific individuals or companies is known as spear phishing. In contrast to bulk phishing, spear phishing attackers often gather and use personal information about their target to increase their probability of success.
Vishing
Voice phishing, or vishing, is the use of telephony to conduct phishing attacks. Landline telephone services have traditionally been trustworthy; terminated in physical locations known to the telephone company, and associated with a bill-payer.
Ransomware
Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.
DMARC
Domain-based Message Authentication, Reporting & Conformance (DMARC) is a widely recognized email protocol that helps people and businesses protect their email addresses and domains from being misused by third parties. It helps identify that an email ...
Email Spoofing
Email spoofing is a technique that is used in spam as well as phishing attacks in order to trick users into thinking that a message actually came from a person or an entity, typically one they can trust, or simply know in the real world. In spoofing ...