Phishing: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Added link)
imported>Doug Williamson
(Add quote. Source: https://blogs.treasurers.org/tackling-cyber-risks-in-treasury/.)
Line 5: Line 5:


The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
:<span style="color:#4B0082">'''''Most common attacks'''''</span>
:"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
:''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.''





Revision as of 13:57, 22 May 2019

Cybercrime

Phishing is an email-based fraud.


The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.


Most common attacks
"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.


The name 'phishing' is a grim joke variant on 'fishing'.


See also