-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathNavigation.html
177 lines (163 loc) · 11.6 KB
/
Navigation.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
h2 {
text-decoration: underline;
}
</style>
<style>
h2 {background-color:#FFFFFF;
}
#myDIV {
height:300px;
background-color:#0d6efd;;
padding:10px;
text-decoration-line: underline;
}
</style>
<title>Hinder Phishing by Securing Your Devices</title>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link href="https://fonts.googleapis.com/css?family=Montserrat" rel="stylesheet" type="text/css">
<link href="https://fonts.googleapis.com/css?family=Lato" rel="stylesheet" type="text/css">
<link href="https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-1BmE4kWBq78iYhFldvKuhfTAU6auU8tT94WrHftjDbrCEXSU1oBoqyl2QvZ6jIW3" crossorigin="anonymous">
<script src="https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/js/bootstrap.bundle.min.js" integrity="sha384-ka7Sk0Gln4gmtz2MlQnikT1wXgYsOg+OMhuP+IlRH9sENBO0LRn5q+8nbTov4+1p" crossorigin="anonymous"></script>
<styles></styles>
<img src="logo.png" class="img-fluid rounded-circle" width="100">
<styles></styles>
</head>
<body id="myPage" data-spy="scroll" data-target=".navbar" data-offset="60" class="container-sm">
<nav class="navbar navbar-expand-lg navbar-white bg-white">
<div class="container-fluid">
<button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#navbarNavAltMarkup" aria-controls="navbarNavAltMarkup" aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<div class="collapse navbar-collapse" id="navbarNavAltMarkup">
<div class="navbar-nav">
<a class="nav-link active" aria-current="page" href="mattdesign.html">Home</a>
<a class="nav-link" href="Navigation.html">What Is Phishing?</a>
<a class="nav-link" href="index.html">Ways To Protect Yourself</a>
<a class="nav-link" href="HowToSpotPhishing.html"> How To Spot Phishing</a>
<a class="nav-link" href="phishing-page.html"> Phishing Page</a>
</div>
</div>
</div>
</nav>
<h1>What is Phishing?</h1>
<div class="bg-primary row text-dark text-center border border-dark border-5 rounded-start" ></div>
<p>Phishing is when attackers send malicious emails designed to trick people into falling for a scam. The intent is often to get users to reveal financial information, system credenitals or other sensitive data.</p>
<p class="p1"> If this attack becomes successful personal data like login credentials and bank account information could be obtained; or malware can be installed automatically onto devices. </p>
<p>Phishing is when attackers send malicious emails designed to trick people into falling for a scam. The intent is often to get users to reveal financial information, system credenitals or other sensitive data.</p> <break>
</break>
<p>Sometimes hackers are satisfied with getting your personal data and credit card information for financial gain. In other cases, phishing emails are sent to gather employee login information or other details for use in more malicious attacks against a few individuals or a specific company. Phishing is a type of cyber attack that everyone should learn about in order to protect themselves and ensure email security throughout an organization.</p>
<p>Some examples of types of Phishing: <break>
<ul>
<li><a href="#Email Phishing">Email Phishing</a></li>
<li><a href="#Spear Phishing">Spear Phishing</a></li>
<li><a href="#Whailing">Whailing</a></li>
<li><a href="#Smishing">Smishing</a></li>
<li><a href="#Vishing">Vishing</a></li>
<li><a href="#Angler Phishing">Angler Phishing</a></li>
<li><a href="#Business Email Compromise">Business Email Compromise</a></li>
<li><a href="#Clone Phishing">Clone Phishing</a></li>
<li><a href="#Evil Twine Phishing">Evil Twin Phishing</a></li>
</ul>
</break></p>
<div class="container">
<div class="row row-cols-2">
<div>
<div class="col"><h2 id="Email Phishing"> Email Phishing</h2>
<img src="https://blog-en.webroot.com/wp-content/uploads/2019/02/Cyber-News-Rundown_PhishingEmail_800x4001.gif" width=100%> </div>
<div class="col"><p>With a majority of those messages being sent in massive waves to thousands of recipients.These attacks often impersonate well-known brands, and disguise themselves as shipping updates, password reset requests, and overdue invoice notices from fictitious companies. </p></div>
<p>Email Phishing is an attempt to steal sensitive information via an email that appears to be from a legitimate organization </p>
<ul>
<li>Disguise themselves as shipping updates</li>
<li>Shipping address</li>
<li>Password reset requests</li>
<li>Overdue invoice notices from fictitious companies</li>
</ul>
</div>
<img src="https://hailbytes.com/wp-content/uploads/2020/06/Email-Phishing-Attack.gif" width=100%> </div>
</div>
<div class="container">
<div class="row row-cols-2">
<div>
<h2 id="Spear Phishing">Spear Phishing</h2>
<p>Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.Emails use a much more targeted approach to trick their victims by using company specific information to make their messages even more believable. </p>
<ul>
<li>phone numbers</li>
<li>Email Signatures</li>
<li>Password reset requests</li>
</ul>
</div>
<img src="https://www.raytheon.com/sites/default/files/2018-09/4469511_Corp_Sperarphishing15fps.gif" style=float:right; width="100%">
<div>
<h2 id="Whailing">Whailing</h2>
<ul>
<li>Spoofed fake email addresses</li>
<li>Spoofed names</li>
</ul>
<p>Very similar to spear phishing, but goes an extra step further by targeting specific high level staff within an organization. The goal of whaling is to impersonate a C-level executive and use that authority to pressure staff members into sending sensitive information. </p>
</div>
<img src="https://cdn.lynda.com/course/648923/648923-636422109431632594-16x9.jpg" style=float:right; width="100%">
<div>
<h2 id="Smishing and Vishing">Smishing and Vishing </h2>
<p> Vishing involves using a phone to trick victims into handing over sensitive information, rather than an email. In a vishing attack, the threat actors call their target and use social engineering tactics to manipulate them into providing credential or financial information. Tactics often involve, like a lot of phishing attacks, a deadline or time limit to create a sense of urgency or impersonating someone with authority in order to make the user feel like they have no choice but to hand over information. Smishing is a closely related phishing attack that also uses phone numbers. But instead of voice mail, smishing uses text messages to trick users. These messages could contain a phone number for a targeted user to call or a link to an attacker-controlled website hosting malware or a phishing page. Victims tend to trust text messages more than a suspicious email. But, it’s more challenging to identify a vishing attack than a phishing and smishing attack.</p>
<p>Smishing is a form of phishing that uses moblie phones as the attack platform. Sending Fradulent emails that seek to trick the recipient into opening a malware-laden attachment or clicking on a malware link.</p>
<ul>
<li>Mobile phones</li>
<li>Social Insurance</li>
<li>Credit Card</li>
<li>Text Messages or SMS</li>
</ul>
</div>
<img src="https://blog.logix.in/wp-content/uploads/2019/10/Blog18_vishing-smishing-730x410.png" style=float:right; width="100%">
<h2 id="Angler Phising">Angler phishing</h2>
<p>Angler phishing is a specific type of phishing attack that exists on social media. Angler phishing attacks are launched using bogus corporate social media accounts. cyber criminals are aware that organisations are increasingly using social media to interact with their customers, whether that’s for marketing and promotional purposes or to offer a simple route for customers to ask questions or make complaints.</p>
<p>Angler Phishing is a new type of phishing attack that targets social media users by disgusing as a customer service agent on social media in order to reach a disgruntled custom and obtain their personal information on account credenitals.</p>
<ul>
<li>Instagram</li>
<li>Twitter</li>
<li>Facebook</li>
<li>Tik Tok</li>
</ul>
<img src="https://cdn.videoplasty.com/gif/criminal-phishing-stock-gif-4746-640x360.gif" style=float:right; width="100%">
<div>
<h2 id="Business Email Compromise">Business Email Compromise</h2>
<p>is a targeted attack that focuses on companies who frequently conduct wire transfers and have global partnerships. Attackers use keyloggers, spoofed domains, and phishing attacks with the primary goals of tricking the victim into wiring money into the attackers account. </p>
<ul>
<li>Wiring money into the attackers account</li>
<li>Spoofed domain</li>
</ul>
<img src="https://i1.wp.com/secure.wphackedhelp.com/blog/wp-content/uploads/2020/01/cyber-security-EMAIL-AND-WEB-PHISHING.gif?resize=653%2C440&ssl=1" style=float:right; width="100%">
</div>
<div>
<h2 id="Clone Phishing">Clone Phishing</h2>
<p>The clone is a near copy to the original where the attachments or links are replaced with malware or a virus. The email is typically spoofed to appear like it is being sent by the original sender and will claim it is a simple re-send. What’s worse, the email is sent out to a large number of recipients and the attacker just waits for the victims who click it. When a victim succumbs to the cloned email, the attacker forwards the same forged email to the contacts from the victim’s inbox. This type of attack is considered the most harmful because it is hard for victims to suspect a spoofed email.</p>
</div>
<img src="https://media0.giphy.com/media/l1J9Kka5qOwnj8fUA/giphy.gif" style=float:right; width="100%">
<div>
<h2 id="Evil Twin Phishing">Evil Twin Phishing</h2>
<p>An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials.
Evil twin attacks get their name from their ability to imitate legitimate Wi-Fi networks to the extent that they are indistinguishable from one another. This type of attack is particularly dangerous because it can be nearly impossible to identify.</p>
<img src="https://hackeroyale.com/wp-content/uploads/2017/06/feature.jpg" style=float:right; width="100%">
</div>
<img src="https://cdn.dribbble.com/users/1195555/screenshots/10822300/media/e38cfcf39522ace3249cc5017babc281.gif">
</div>
<div class="container">
<div class="row row-cols-2">
<div class="col"><h2>
<img src="https://cdn.dribbble.com/users/1993521/screenshots/5007515/spy-train.gif" style=float:roght; width="100%"></div>
<div class="row">
<div class="col p-0">
<img src="https://cdn.dribbble.com/users/2507445/screenshots/5827735/internet-safety-hacker.gif" style="float: left;">
</div>
</div>
</div>
</div>
<img src="https://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_60/3006089/465270_638695.gif" jsaction="load:XAeZkd;" jsname="HiaYvf" class="n3VNCb" alt="Report Fake Email (Mobile) - Anti-Phishing tool and mailbox protection, on Gmail and O365" data-noaft="1" style="width: 400px; height: 200
px; margin: 0px;">
</body>
</html>