Useful Links
Computer Science
Cybersecurity
Phishing
1. Introduction to Phishing
2. Anatomy of a Phishing Attack
3. Types of Phishing Attacks
4. Psychological Manipulation Tactics
5. Technical Mechanisms and Infrastructure
6. Detection and Identification Techniques
7. Prevention and Protection Strategies
8. Impact Assessment and Consequences
9. Legal and Regulatory Framework
Psychological Manipulation Tactics
Urgency and Time Pressure
Account Suspension Threats
Limited-Time Offers
Deadline-Based Coercion
Emergency Response Exploitation
Fear and Anxiety Induction
Security Breach Notifications
Legal Action Threats
Financial Loss Warnings
Health and Safety Concerns
Authority and Trust Exploitation
Executive Impersonation
Government Agency Spoofing
Technical Support Masquerading
Official Language and Terminology
Greed and Reward Appeals
Prize and Lottery Scams
Investment Opportunities
Cashback and Refund Offers
Exclusive Deal Promotions
Curiosity and Information Seeking
Breaking News Exploitation
Gossip and Scandal Lures
Exclusive Information Access
Mystery and Intrigue Creation
Social Responsibility and Empathy
Charity and Donation Requests
Disaster Relief Scams
Crowdfunding Fraud
Help Request Exploitation
Social Proof and Conformity
Fake Testimonials
Bandwagon Effect Exploitation
Peer Pressure Tactics
Community Participation Claims
Reciprocity and Obligation
Favor Request Exploitation
Gift and Reward Conditioning
Debt and Gratitude Manipulation
Previous
3. Types of Phishing Attacks
Go to top
Next
5. Technical Mechanisms and Infrastructure