Computer security: Difference between revisions

Content deleted Content added
Tag: Reverted
m Restored revision 1295772283 by JoseyWales019 (talk): Blog spam
Line 81:
 
Preying on a victim's trust, phishing can be classified as a form of [[Social engineering (security)|social engineering]]. Attackers can use creative ways to gain access to real accounts. A common scam is for attackers to send fake electronic invoices<ref>{{cite web |last=Lazarus |first=Ari |date=23 February 2018 |title=Phishers send fake invoices |url=https://www.consumer.ftc.gov/blog/2018/02/phishers-send-fake-invoices |access-date=17 February 2020 |website=Consumer Information |language=en}}</ref> to individuals showing that they recently purchased music, apps, or others, and instructing them to click on a link if the purchases were not authorized. A more strategic type of phishing is spear-phishing which leverages personal or organization-specific details to make the attacker appear like a trusted source. Spear-phishing attacks target specific individuals, rather than the broad net cast by phishing attempts.<ref name=":3">{{cite web | website=Trellix | title=Email Security | date=17 May 2022 | url=https://www.trellix.com/en-us/platform/email-security.html | archive-url=https://web.archive.org/web/20220522081555/https://www.trellix.com/en-us/platform/email-security.html | archive-date=22 May 2022 | access-date=24 October 2022 }}</ref>
 
== Pishhing and Scams Attack ==
 
Phishing is a type of social engineering attack where a user is duped by sending false emails and messages to gather personal information about them or by trying to infect the target device with malicious software and use it for malevolent purposes [https://www.trendsparks.space/2025/06/12-types-of-cyber-crime.html Read More....]
 
===Privilege escalation===