Page 28 - security threats new-1
P. 28
✓ Clone phishing is a type of phishing attack whereby a legitimate.
➢ Voice phishing –
✓ It is also known as a vishing.
✓ The use of telephony (often Voice over IP telephony) to conduct
phishing attacks.
➢ SMS phishing –
✓ It is also know as a smishing.
✓ Conceptually similar to email phishing, except attackers use cell
phone text messages to deliver the 'bait
➢ Page hijacking -
✓ Involves compromising legitimate web pages in order to redirect
users to a malicious website or an exploit kit via cross site
scripting.
• How does phishing work?
• How do I protect against phishing attacks
➢ User Education –
✓ One way to protect your organization from phishing is user
education.
✓ Education should involve all employees .
✓ High-level executives are often a target Teach them how to
recognize a phishing email and what to do when they receive one.
✓ Simulation exercises are also key for assessing how your
employees react to a staged phishing attack