Phishing Techniques
Prevention and Security Measures
Notorious Phishing Scams
100

This deceptive practice involves the use of fraudulent emails to trick individuals into divulging sensitive information such as passwords or financial details.

Email Phishing

100

This security measure, often abbreviated as a three-letter acronym, adds an extra layer of protection by requiring users to provide multiple forms of identification

Multi-Factor Authentication (MFA)

100

This classic phishing scam often involves an email claiming to be from royalty, promising great wealth in exchange for a small initial payment.

Nigerian Prince Scam

200

A form of cyber attack where malicious actors send fraudulent text messages, often posing as legitimate entities, to trick individuals into revealing personal information or clicking on malicious links.

SMS Phishing (Smishing)
200

This proactive approach to cybersecurity involves educating employees about potential threats and best practices.

Security Awareness Training

200

A fraudulent attempt to obtain sensitive financial information, this phishing scam impersonates a government agency, particularly during tax season.

IRS Tax Scam

300

In this social engineering tactic, attackers use voice communication, often over the phone, to impersonate trusted entities or manipulate individuals into revealing sensitive information.

Voice Fishing (Vishing)

300

To prevent malicious emails from reaching inboxes, organizations use this process, often automated, to block or redirect suspicious emails.

Email Filtering

300

In this phishing tactic, cybercriminals send fake emails or messages, pretending to be an online payment service, to trick individuals into revealing account credentials or financial details.

PayPal Scam

400

A highly targeted form of phishing where cybercriminals tailor their deceptive messages to a specific individual, often using personalized information to increase the likelihood of success.

Spear Phishing

400

In the effort to enhance an organization's ability to withstand phishing threats, they will occasionally engage in this targeted practice.

Phishing Simulation

400

Perpetrators in this phishing scam engage in creating counterfeit social media profiles, to imitate real individuals, often leading friends and contacts to unwittingly share personal information.

Social media Impersonation

500

This targeted and sophisticated form of phishing specifically aims at high-profile individuals within an organization, such as executives or key decision-makers, seeking sensitive information.

Whaling

500

This type of software, designed to detect and neutralize malicious programs as well as prevent phishing attacks, serves as a crucial line of defense in cybersecurity.

Anti-Malware/Anti-Phishing Software

500

This phishing scam involves fraudulent notifications supposedly from shipping services, misleading individuals with false updates, or requesting additional payments related to package shipments.

UPS Scams