You are on page 1of 2

Scam and phishing

Scams and phishing are deceptive practices that aim to trick individuals into providing sensitive
information, such as passwords, financial details, or personal information. Here's a brief
overview of each:

Scams:

Definition: Scams are fraudulent schemes designed to deceive individuals or groups, typically
for financial gain.

Common Types:

Online Auction Fraud: Misleading descriptions or non-delivery of goods purchased through


online auctions.

Lottery or Prize Scams: Notifying individuals that they've won a prize but requiring payment or
personal information to claim it.

Tech Support Scams: Fraudulent calls or messages claiming to be from tech support, asking for
access to your computer or personal information.

Romance Scams: Building online romantic relationships to exploit emotions and solicit money.

Phishing:

Definition: Phishing is a form of cyberattack in which attackers pose as trustworthy entities to


obtain sensitive information. It often involves emails, messages, or websites that appear
legitimate.

Common Types:

Email Phishing: Sending emails that appear to be from a reputable source, tricking recipients
into revealing sensitive information.

Spear Phishing: Customized phishing attacks targeting specific individuals or organizations.

Smishing (SMS Phishing): Phishing attacks through text messages, often containing malicious
links or requesting sensitive information.
Scam and phishing
Vishing (Voice Phishing): Phishing attacks conducted over the phone, where attackers
impersonate legitimate entities to obtain information.

Other malware programs


Spyware:

Cool Web Search: Redirected web searches and displayed pop-up ads.

Fin Fisher (Fin Spy): Surveillance spyware used by governments.

Adware:

Super fish: Pre-installed on some Lenovo laptops, injected ads into web pages.

Rootkits:

Sony BMG Rootkit: Used by Sony in some music CDs, had security vulnerabilities.

Alureon (TDSS): Modified the Master Boot Record (MBR) for stealth.

Keyloggers:

Dark Tequila: Targeted users in Latin America, stealing financial information.

Hawk Eye: Used to log keystrokes and capture sensitive information.

Botnets:

Zeus (Game over Zeus): Used for financial fraud and stealing banking information.

Mirai: Infected Internet of Things (IoT) devices for DDoS attacks.

Backdoors:

Back Orifice: Created by the hacking group Cult of the Dead Cow.

Net Bus: Allowed unauthorized remote access to a Windows system.

You might also like