Useful Links
Computer Science
Cybersecurity
Phishing
1. Introduction to Phishing
2. Anatomy of a Phishing Attack
3. Types of Phishing Attacks
4. Psychological Manipulation Tactics
5. Technical Mechanisms and Infrastructure
6. Detection and Identification Techniques
7. Prevention and Protection Strategies
8. Impact Assessment and Consequences
9. Legal and Regulatory Framework
Types of Phishing Attacks
Communication Channel-Based Classification
Email Phishing
Bulk Email Campaigns
Mass Distribution Techniques
Common Pretexts and Themes
Seasonal and Event-Based Campaigns
SMS Phishing (Smishing)
Text Message Lures
Mobile-Specific Vulnerabilities
SIM Swapping Integration
Voice Phishing (Vishing)
Phone Call Scams
Caller ID Spoofing
Interactive Voice Response (IVR) Exploitation
Voice Deepfake Technology
QR Code Phishing (Quishing)
Malicious QR Code Generation
Physical Distribution Methods
Digital QR Code Placement
Social Media Phishing
Platform-Specific Attacks
Impersonation Accounts
Malicious Direct Messages
Fake Advertisement Campaigns
Instant Messaging Phishing
WhatsApp Scams
Telegram Exploitation
Discord Server Infiltration
In-Application Phishing
Push Notification Abuse
In-App Message Exploitation
Mobile App Store Impersonation
Targeting Strategy-Based Classification
Spear Phishing
Highly Targeted Individual Attacks
Extensive Personalization Techniques
Long-Term Reconnaissance
Whaling Attacks
Executive and C-Suite Targeting
High-Value Individual Focus
Business Email Compromise Integration
Clone Phishing
Legitimate Message Replication
Malicious Content Substitution
Timing-Based Exploitation
Angler Phishing
Customer Support Impersonation
Social Media Customer Service Exploitation
Brand Reputation Abuse
Watering Hole Attacks
Compromised Website Exploitation
Industry-Specific Site Targeting
Supply Chain Integration
Technical Approach-Based Classification
Deceptive Phishing
Brand Impersonation
Trust Relationship Exploitation
Malware-Based Phishing
Payload Delivery Mechanisms
Multi-Stage Attack Chains
Man-in-the-Middle (MitM) Phishing
Session Interception
Real-Time Data Manipulation
Certificate Spoofing
Search Engine Phishing
SEO Poisoning Techniques
Malicious Site Indexing
Search Result Manipulation
Pharming Attacks
DNS Hijacking
Host File Modification
Router Compromise
Previous
2. Anatomy of a Phishing Attack
Go to top
Next
4. Psychological Manipulation Tactics