{"id":17381,"date":"2018-10-04T04:21:39","date_gmt":"2018-10-03T20:21:39","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=17381"},"modified":"2020-11-24T09:06:05","modified_gmt":"2020-11-24T01:06:05","slug":"what-is-phishing-scams","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/what-is-phishing-scams\/","title":{"rendered":"What is Phishing Scams"},"content":{"rendered":"<p><strong>Phishing Meaning<\/strong> :<br \/>\nPhishing is a scam planned to gather confidential personal information using deceptive emails and websites. One of the easiest forms of cyber attack for a criminal to carry out, phishing is becoming increasingly sophisticated.<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-17385 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=640%2C335&#038;ssl=1\" alt=\"Eye-opening-Facts-About-Phishing-Scams\" width=\"640\" height=\"335\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h2><b>6 Eye-opening Facts About Phishing Scams<\/b><\/h2>\n<ol>\n<li style=\"font-weight: 400;\"><b>30%<\/b><span style=\"font-weight: 400;\"> of phishing messages get <\/span><b>opened by targeted users <\/b><span style=\"font-weight: 400;\">and 12% of those users click on the malicious attachment or link.<\/span><i><i><span style=\"font-weight: 400;\"> (Verizon Data Breach Investigations Report)<\/span><\/i><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Nearly <\/span><b>1.5 million <\/b><span style=\"font-weight: 400;\">new phishing sites are created each month. <\/span><i><i><span style=\"font-weight: 400;\">(Webroot Threat Report)<\/span><\/i><\/i><\/li>\n<li style=\"font-weight: 400;\"><b>95%<\/b><span style=\"font-weight: 400;\"> of all attacks on enterprise networks are the result of successful spear phishing. <\/span><i><i><span style=\"font-weight: 400;\">(SANS Institute)<\/span><\/i><\/i><\/li>\n<li style=\"font-weight: 400;\"><b>76% <\/b><span style=\"font-weight: 400;\">of businesses reported being a victim of a phishing attack in the last year. <\/span><i><i><span style=\"font-weight: 400;\">(Wombat Security State of the Phish)<\/span><\/i><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fake invoice messages are the #1 type of phishing lure. <\/span><i><i><span style=\"font-weight: 400;\">(Internet Security Threat Report (ISTR))<\/span><\/i><\/i><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Apple IDs are the <\/span><b>#1 target<\/b><span style=\"font-weight: 400;\"> for credential theft emails. (Proofpoint)<\/span><\/li>\n<\/ol>\n<h2><b>Four Most Common Types of Phishing <\/b><\/h2>\n<ol>\n<li><strong> DECEPTIVE PHISHING<br \/>\n<\/strong>Fraudsters create a fake login page, send out mass emails asking victims to verify account, steal their details and access their bank accounts.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong> SPEAR PHISHING<br \/>\n<\/strong>Fraudsters scam victims using a customised message crafted to a targeted person in an organisation to gain trust so that victims will submit their personal data without hesitation.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong> PHARMING<br \/>\n<\/strong>Fraudsters hijack victim website domain name and redirect visitors to other malicious websites by confusing the visitors. Victims will then be scammed on the malicious website, which looks almost 100% same with the real website.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"><strong> GOOGLE DOCS<\/strong> <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">An invitation is sent by fraudsters to ask the victims to view documents on some convincing landing page, for example, Google docs. Attackers will then access your Gmail, Google Play and other Google Account. <\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_17382\" aria-describedby=\"caption-attachment-17382\" style=\"width: 1200px\" class=\"wp-caption alignnone\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"wp-image-17382 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=696%2C1918&#038;ssl=1\" alt=\"Eye-opening-Facts-About-Phishing-Scams\" width=\"696\" height=\"1918\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=109%2C300&amp;ssl=1 109w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=768%2C2116&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=372%2C1024&amp;ssl=1 372w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=696%2C1918&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=1068%2C2943&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=152%2C420&amp;ssl=1 152w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/Eye-opening-Facts-About-Phishing-Scams.jpg?resize=41%2C114&amp;ssl=1 41w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-17382\" class=\"wp-caption-text\">Eye-opening-Facts-About-Phishing-Scams<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Meaning : Phishing is a scam planned to gather confidential personal information using deceptive emails and websites. One of the easiest forms of cyber attack for a criminal to carry out, phishing is becoming increasingly sophisticated. 6 Eye-opening Facts About Phishing Scams 30% of phishing messages get opened by targeted users and 12% of [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":17385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[271,293,7],"tags":[],"class_list":{"0":"post-17381","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-infographic","8":"category-security-backup","9":"category-sharing-tips-for-success"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2018\/10\/1200x628-Eye-opening-Facts-About-Phishing-Scams.png?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-4wl","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=17381"}],"version-history":[{"count":7,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17381\/revisions"}],"predecessor-version":[{"id":18908,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/17381\/revisions\/18908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/17385"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=17381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=17381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=17381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}