FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS PHISHING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What 2 places do scammers commonly use information from to create targeted spear phishing attacks? [Choose 2]
A
Social Media
B
Identification Cards
C
Online public records
D
Libraries
Explanation: 

Detailed explanation-1: -The attackers often disguise themselves as a trustworthy entity and make contact with their target via email, social media, phone calls (often called “vishing” for voice-phishing), and even text messages (often called “smishing” for SMS-phishing).

Detailed explanation-2: -Smishing and vishing With both smishing and vishing, telephones replace emails as the method of communication. Smishing involves criminals sending text messages (the content of which is much the same as with email phishing), and vishing involves a telephone conversation.

Detailed explanation-3: -There are several ways scammers can carry out spear phishing attacks. Common methods include: A spear phisher sends an email to their target. That email may include malicious links or attachments they will ask the target to open, downloading malware or ransomware to their computer.

Detailed explanation-4: -Phishing is a popular form of cybercrime because of how effective it is. Cybercriminals have been successful using emails, text messages, and direct messages on social media or in video games, to get people to respond with their personal information. The best defense is awareness and knowing what to look for.

There is 1 question to complete.