You are on page 1of 7

TWITTER PHISHING

ATTACK
NAME:Payal shelke
ROLLNO:PF44
DIV:F
WHAT IS PHISHING
 Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers.
 It occurs when an attacker, masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message.
 The information is then used to access important accounts and can result in
identity theft and financial loss.
 Phishing messages manipulate a user, causing them to perform actions like installing a
malicious file, clicking a malicious link, or divulging sensitive information such as access
credentials
TYPES OF PHISHING
 Email Phishing
 Spear Phishing
 Whaling
 Smishing and Vishing
 Angler Phishing
How Does Phishing Happen?

 Phishing happens when an unsuspecting victim responds to fraudulent requests


that demand action. This action can include downloading an attachment, clicking a
link, filling out a form, updating a password, calling a phone number or using a new
wi-fi hot spot. A crucial aspect of successful security awareness training is in
educating people about how easy it is to be tricked into giving up confidential
information.
How To Manage  Such Phishing Attacks?

  Incorporate cyber security awareness campaigns, training, support and education


into your corporate culture.
 Don’t give your information to an unsecured site
  Get free anti-phishing add-ons
 Rotate passwords regularly
 Install firewalls
CONCLUSION

 No single technology will completely stop phishing.


 a combination of good organization and practice, proper application of current
technologies, and improvements in security technology has the potential to drastically
reduce the prevalence of phishing and the losses suffered from it.
THANK YOU

You might also like