(Difference between pages)
imported>Doug Williamson |
|
Line 1: |
Line 1: |
| ''Cybercrime''.
| | == Summary == |
| | | Importing files from local file repository |
| Phishing is an email-based fraud.
| |
| | |
| | |
| The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
| |
| | |
| | |
| :<span style="color:#4B0082">'''''Most common attacks'''''</span>
| |
| :"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
| |
| :''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.''
| |
| | |
| | |
| The name 'phishing' is a grim joke variant on 'fishing'.
| |
| | |
| | |
| == See also == | |
| *[[Advanced Persistent Threat]]
| |
| * [[BEC]]
| |
| * [[Cybercrime]]
| |
| * [[Cybercrime – A Threat And An Opportunity]]
| |
| * [[Hacktivist]]
| |
| * [[Internet]]
| |
| *[[Smishing]]
| |
| *[[Social engineering]]
| |
| * [[Spear phishing]]
| |
| * [[Spoofing]]
| |
| *[[Vishing]]
| |
| * [[Whaling]]
| |
| | |
| [[Category:Identify_and_assess_risks]]
| |
| [[Category:Manage_risks]]
| |
| [[Category:Technology]]
| |
Latest revision as of 09:28, 27 July 2023
Summary
Importing files from local file repository