Phishing is a cyberattack technique where attackers trick users into revealing sensitive information such as passwords, credit card details, or personal data by pretending to be a trusted entity.
In cybersecurity, phishing is commonly carried out through fake emails, websites, messages, or phone calls that appear legitimate. The goal is to manipulate users into clicking malicious links or submitting confidential information.
For example:
- A fake email claims to be from a bank asking users to verify their account details.
- A cloned website mimics a login page to steal usernames and passwords.
- A message on social media asks users to click a link to “reset their password.”
- An attacker impersonates a company support team to request sensitive information.
Common technologies and concepts related to phishing include:
- Social Engineering
- Email Spoofing
- Malicious Links
- Cybersecurity Awareness
- Two-Factor Authentication (2FA)
- Spam Filters
- Fraud Detection Systems
- Data Security
- Identity Theft