2021
DOI: 10.48175/ijarsct-2094
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Various Phishing Techniques and Recent Phishing Attacks

Abstract: Now-a-days internet has become a very unsafe space to deal with. Hackers are constantly trying to gain the user's personal information, and detailed credentials. So many websites on the internet, even though safe, this safety cannot be assured by all websites. These rule breakers avoid abiding by rules, and try to employ methods like trickery and hacking to gain illegal access to private information. T o be able to overcome this problem, we need to first understand the intricacies of how the virus is designed.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Phishing is a type of cyberattack which engages special tools and steps to obtain sensitive information from users. By definition, phishing is a social engineering attack that attackers apply to receive sensitive information from users [6]. The attacker could masquerade as a trusted entity, duping a user into offering their login information.…”
Section: Iibackground On Phishing Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…Phishing is a type of cyberattack which engages special tools and steps to obtain sensitive information from users. By definition, phishing is a social engineering attack that attackers apply to receive sensitive information from users [6]. The attacker could masquerade as a trusted entity, duping a user into offering their login information.…”
Section: Iibackground On Phishing Attacksmentioning
confidence: 99%
“…There are different ways through which these attacks are achieved. Each of these approaches is described to be a type of phishing attack [6]. The main methods included duping clients and users include emails, instant messages, and social media.…”
Section: Iibackground On Phishing Attacksmentioning
confidence: 99%
See 2 more Smart Citations