{"id":2751,"date":"2023-07-04T15:49:05","date_gmt":"2023-07-04T13:49:05","guid":{"rendered":"https:\/\/enthec.com\/?p=2751"},"modified":"2025-01-31T07:45:50","modified_gmt":"2025-01-31T06:45:50","slug":"phishing-what-is-it-and-how-many-types-are-there","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/","title":{"rendered":"Phishing: What Is It and How Many Types Are There"},"content":{"rendered":"

In this article, we will continue to expand our information on one of the most common types of cyberattacks:<\/a> phishing.<\/strong>
\nPhishing is a set of techniques that aim to deceive a victim and gain their trust by impersonating a trusted person, company, or service<\/strong> (impersonation of a trusted third party). The impersonator is called a phisher. The goal is to manipulate the victim and make them perform actions they should not perform (e.g., reveal confidential information or click on a link).
\nThere are several types and examples of phishing, each with specific methods to trick victims. In this post, we describe the most outstanding ones and explain how to protect yourself from them through Enthec’s solutions.<\/strong><\/p>\n

 <\/p>\n

\"Contact\"<\/a><\/p>\n

 <\/p>\n

<\/h2>\n

The most prominent types of phishing<\/span><\/h2>\n

 <\/p>\n

\"types<\/strong><\/h2>\n

<\/h2>\n

Knowing the different types of phishing and how to identify the warning signs will help you protect your information and navigate the digital environment more safely. Read on to find out everything you need to know!<\/strong><\/p>\n

Email phishing<\/h3>\n

Most of these phishing messages are sent through spam. <\/strong>They are not personalized or directed to a specific person or company, and their content varies depending on the phisher’s goal.
\nCommon phishing targets include banks and financial services<\/strong>, cloud productivity and email providers, and streaming services.<\/p>\n

Voice phishing<\/h3>\n

Voice phishing is the use of the phone to carry out attacks. Attackers use VoIP (Voice over IP)<\/strong> technology to make numerous fraudulent calls cheaply or for free to obtain codes, passwords or bank details from the victim, who often does not suspect anything.<\/p>\n

SMS phishing<\/h3>\n

Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link<\/strong>, call a phone number, or contact an email address provided by the attacker via SMS message. Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via SMS message. The criminal attacks with an attempt to obtain personal information, including credit card or social security numbers.<\/strong><\/p>\n

Page hijacking<\/h3>\n

It is achieved by creating an illegitimate copy of a popular website<\/strong> where visitors are redirected to another website when they log on.<\/p>\n

Calendar spoofing<\/h3>\n

Calendar spoofing is when phishing links are delivered via calendar invitations.<\/strong> Calendar invitations are sent that, by default, are automatically added to many calendars.<\/p>\n

Whaling<\/h3>\n

Whaling, also known as CEO fraud<\/strong>, is similar to spear phishing but focused on senior executives or people with critical organizational positions. Attackers are looking to gain valuable information or authorize fraudulent financial transfers.
\nTo learn more, access our post\u2192 What is CEO fraud, and how can it be avoided?<\/a><\/p>\n

Spear phishing<\/h3>\n

This well-known type of phishing stands out for carrying out attacks that target specific individuals or companies. Cybercriminals research their targets to personalize messages and increase the likelihood of success. <\/strong>For example, they may impersonate a colleague or boss by requesting sensitive data.
\nIf you want to learn more about this type of phishing\u2192
What is Spear Phshing: 4 keys to protect your company.<\/a><\/p>\n

Qrshing<\/h3>\n

The trend of using QR codes has also led to the emergence of some scams, such as this type of phishing, which specifically consists of creating malicious QR codes <\/strong>that, when scanned, direct victims to fraudulent sites designed to steal personal information.<\/p>\n

Main keys on how to prevent phishing<\/h2>\n

Now that you know the main types of phishing, it is essential to consider the keys to prevent them.<\/p>\n