Content deleted Content added
Tag: Reverted |
Apparition11 (talk | contribs) m Restored revision 1295772283 by JoseyWales019 (talk): Blog spam |
||
Line 81:
Preying on a victim's trust, phishing can be classified as a form of [[Social engineering (security)|social engineering]]. Attackers can use creative ways to gain access to real accounts. A common scam is for attackers to send fake electronic invoices<ref>{{cite web |last=Lazarus |first=Ari |date=23 February 2018 |title=Phishers send fake invoices |url=https://www.consumer.ftc.gov/blog/2018/02/phishers-send-fake-invoices |access-date=17 February 2020 |website=Consumer Information |language=en}}</ref> to individuals showing that they recently purchased music, apps, or others, and instructing them to click on a link if the purchases were not authorized. A more strategic type of phishing is spear-phishing which leverages personal or organization-specific details to make the attacker appear like a trusted source. Spear-phishing attacks target specific individuals, rather than the broad net cast by phishing attempts.<ref name=":3">{{cite web | website=Trellix | title=Email Security | date=17 May 2022 | url=https://www.trellix.com/en-us/platform/email-security.html | archive-url=https://web.archive.org/web/20220522081555/https://www.trellix.com/en-us/platform/email-security.html | archive-date=22 May 2022 | access-date=24 October 2022 }}</ref>
===Privilege escalation===
|