top of page
Search

Phishing

is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.


Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site, the only difference being the URL of the website in concern.Communications purporting to be from social web sites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that distribute malware.


Website Forgery

Some phishing scams use JavaScript commands in order to alter the address bar of the website they lead to.This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original bar and opening up a new one with the legitimate URL.


Convert Forgery

Covert redirect is a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website. The flaw is usually masqueraded under a log-in popup based on an affected site's domain. It can affect OAuth 2.0 and OpenIDbased on well-known exploit parameters as well. This often makes use of open redirect and XSS vulnerabilities in the third-party application websites. Browshing is another way of redirecting users to phishing websites covertly through malicious browser extensions.


SMS Phishing

SMS phishing, also known as smishing, uses cell phone text messages to induce people to divulge their personal information.Covert redirect is a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website. The flaw is usually masqueraded under a log-in popup based on an affected site's domain. It can affect OAuth 2.0 and OpenID based on well-known exploit parameters as well. This often makes use of open redirect and XSS vulnerabilities in the third-party application websites. Browshing is another way of redirecting users to phishing websites covertly through malicious browser extensions.

2 views0 comments

Recent Posts

See All

Comments


bottom of page