Page 28 - security threats new-1
P. 28

✓ Clone phishing is a type of phishing attack whereby a legitimate.



               ➢ Voice phishing –
                   ✓ It is also known as a vishing.

                   ✓ The use of telephony (often Voice over IP telephony) to conduct

                       phishing attacks.


               ➢ SMS phishing –
                   ✓ It is also know as a smishing.

                   ✓ Conceptually similar to email phishing, except attackers use cell

                       phone text messages to deliver the 'bait


               ➢ Page hijacking -

                   ✓ Involves compromising legitimate web pages in order to redirect
                       users to a malicious website or an exploit kit via cross site

                       scripting.





                   •  How does phishing work?


                   •  How do I protect against phishing attacks
               ➢ User Education –

                   ✓ One way to protect your organization from phishing is user

                       education.
                   ✓ Education should involve all employees .

                   ✓ High-level executives are often a target Teach them how to
                       recognize a phishing email and what to do when they receive one.

                   ✓ Simulation exercises are also key for assessing how your

                       employees react to a staged phishing attack
   23   24   25   26   27   28   29   30   31   32