{"id":2751,"date":"2023-07-04T15:49:05","date_gmt":"2023-07-04T13:49:05","guid":{"rendered":"https:\/\/enthec.com\/?p=2751"},"modified":"2025-01-31T07:45:50","modified_gmt":"2025-01-31T06:45:50","slug":"phishing-what-is-it-and-how-many-types-are-there","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/","title":{"rendered":"Phishing: What Is It and How Many Types Are There"},"content":{"rendered":"
In this article, we will continue to expand our information on one of the most common types of cyberattacks:<\/a> phishing.<\/strong> <\/p>\n <\/p>\n <\/p>\n Knowing the different types of phishing and how to identify the warning signs will help you protect your information and navigate the digital environment more safely. Read on to find out everything you need to know!<\/strong><\/p>\n Most of these phishing messages are sent through spam. <\/strong>They are not personalized or directed to a specific person or company, and their content varies depending on the phisher’s goal. Voice phishing is the use of the phone to carry out attacks. Attackers use VoIP (Voice over IP)<\/strong> technology to make numerous fraudulent calls cheaply or for free to obtain codes, passwords or bank details from the victim, who often does not suspect anything.<\/p>\n Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link<\/strong>, call a phone number, or contact an email address provided by the attacker via SMS message. Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via SMS message. The criminal attacks with an attempt to obtain personal information, including credit card or social security numbers.<\/strong><\/p>\n It is achieved by creating an illegitimate copy of a popular website<\/strong> where visitors are redirected to another website when they log on.<\/p>\n Calendar spoofing is when phishing links are delivered via calendar invitations.<\/strong> Calendar invitations are sent that, by default, are automatically added to many calendars.<\/p>\n Whaling, also known as CEO fraud<\/strong>, is similar to spear phishing but focused on senior executives or people with critical organizational positions. Attackers are looking to gain valuable information or authorize fraudulent financial transfers. This well-known type of phishing stands out for carrying out attacks that target specific individuals or companies. Cybercriminals research their targets to personalize messages and increase the likelihood of success. <\/strong>For example, they may impersonate a colleague or boss by requesting sensitive data. The trend of using QR codes has also led to the emergence of some scams, such as this type of phishing, which specifically consists of creating malicious QR codes <\/strong>that, when scanned, direct victims to fraudulent sites designed to steal personal information.<\/p>\n Now that you know the main types of phishing, it is essential to consider the keys to prevent them.<\/p>\n If you have been the victim of an attack, you should first change your access credentials and notify the impersonated entity to solve the phishing. <\/strong>In addition, it is advisable to use threat monitoring solutions, such as Enthec’s Kartos, which allows you to detect active campaigns and prevent new fraud attempts.<\/p>\n Kartos Corporate Threat Watchbots <\/a>is the monitoring and cyber surveillance platform developed by Enthec for the protection of organizations<\/strong>. Among its capabilities, the real-time location of active phishing campaigns with corporate identity theft and their monitoring until their total deactivation stands out. <\/p>\n","protected":false},"excerpt":{"rendered":" In this article, we will continue to expand our information on one of the most common types of cyberattacks: phishing. […]<\/p>\n","protected":false},"author":4,"featured_media":2748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[52,24,32,33,38],"class_list":["post-2751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-phishing-en","tag-cybersecurity","tag-kartos-en","tag-risks","tag-organizations"],"yoast_head":"\n
\nPhishing is a set of techniques that aim to deceive a victim and gain their trust by impersonating a trusted person, company, or service<\/strong> (impersonation of a trusted third party). The impersonator is called a phisher. The goal is to manipulate the victim and make them perform actions they should not perform (e.g., reveal confidential information or click on a link).
\nThere are several types and examples of phishing, each with specific methods to trick victims. In this post, we describe the most outstanding ones and explain how to protect yourself from them through Enthec’s solutions.<\/strong><\/p>\n<\/a><\/p>\n
<\/h2>\n
The most prominent types of phishing<\/span><\/h2>\n
<\/strong><\/h2>\n
<\/h2>\n
Email phishing<\/h3>\n
\nCommon phishing targets include banks and financial services<\/strong>, cloud productivity and email providers, and streaming services.<\/p>\nVoice phishing<\/h3>\n
SMS phishing<\/h3>\n
Page hijacking<\/h3>\n
Calendar spoofing<\/h3>\n
Whaling<\/h3>\n
\nTo learn more, access our post\u2192 What is CEO fraud, and how can it be avoided?<\/a><\/p>\nSpear phishing<\/h3>\n
\nIf you want to learn more about this type of phishing\u2192 What is Spear Phshing: 4 keys to protect your company.<\/a><\/p>\nQrshing<\/h3>\n
Main keys on how to prevent phishing<\/h2>\n
\n
Kartos by Enthec helps you locate active phishing campaigns<\/h2>\n
\nContact us <\/a>to learn more about how Kartos can help protect your organization from phishing and other threats.<\/strong><\/p>\n