{"id":2561,"date":"2021-03-15T10:14:00","date_gmt":"2021-03-15T04:44:00","guid":{"rendered":"http:\/\/signals.dmarcsonar.com\/?p=12"},"modified":"2023-12-05T12:07:45","modified_gmt":"2023-12-05T06:37:45","slug":"phishing","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/phishing\/","title":{"rendered":"What is Phishing ?"},"content":{"rendered":"\n

Definition<\/h2>\n\n\n\n

The term phishing is a general term for the creation and use by criminals of e-mails and websites \u2013 designed to look like they come from well-known, legitimate and trusted businesses, financial institutions and government agencies \u2013 in an attempt to gather personal, financial and sensitive information. <\/p>\n\n\n\n

\n

Download FREE RBI Cyber Security Framework Checklist<\/a><\/p>\n<\/blockquote>\n\n\n\n

Why ?<\/h2>\n\n\n\n

These criminals deceive Internet users into disclosing their bank and financial information or other personal data such as usernames and passwords, or into unwittingly downloading malicious computer code onto their computers that can allow the criminals subsequent access to those computers or the users\u2019 financial accounts.<\/p>\n\n\n\n

<\/p>\n\n\n\n

How ? <\/h2>\n\n\n\n

In a typical phishing scheme, criminals who want to obtain personal data from people online first create unauthorized replicas of (or \u201cspoof\u201d) a real website and e-mail, usually from a financial institution or another company that deals with financial information, such as an online merchant. The e-mail will be created in the style of e-mails by a legitimate company or agency, using its logos and slogans.<\/p>\n\n\n\n

Phishers typically then send the “spoofed” e-mails to as many people as possible in an attempt to lure them in to the scheme. In some \u201cspear phishing\u201d attacks, phishers have used other illegal means to obtain personal information about a group of people, then target that specific group with e-mails that include illegally obtained information to make the e-mails appear more plausible. These e-mails redirect consumers to a spoofed website, appearing to be from that same business or entity. The criminals know that while not all recipients will have accounts or other existing relationships with these companies, some of them will and therefore are more likely to believe the e-mail and websites to be legitimate.<\/p>\n\n\n\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Download RBI Cyber Security Framework Checklist<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

We have curated the complete checklist to help you achive this compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tDownload for free<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n

TLDR;<\/h2>\n\n\n\n

The concept behind many phishing attacks is similar to that of “pretext” phone calls (i.e., phone calls from persons purporting to be with legitimate institutions or companies asking the call recipients for personal information). In fact, the criminals behind these e-mails, websites, and phone calls have no real connection with those businesses. Their sole purpose is to obtain the consumers\u2019 personal data to engage in various fraud schemes.<\/p>\n","protected":false},"excerpt":{"rendered":"

Definition The term phishing is a general term for the creation and use by criminals of e-mails and websites \u2013 designed to look […]<\/p>\n","protected":false},"author":8,"featured_media":120,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85,250,31,13],"tags":[],"class_list":["post-2561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anti-phishing","category-anti-phishing-solution","category-phishing","category-uncategorized-en"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/2561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=2561"}],"version-history":[{"count":7,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/2561\/revisions"}],"predecessor-version":[{"id":10312,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/2561\/revisions\/10312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media\/120"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=2561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=2561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=2561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}