Learn about advanced phishing tactics.
- [Instructor] Advanced phishing methods…have the objective of gaining access to resources,…stealing data, and making large financial gains.…This is often done by having people…reveal their account credentials,…like their usernames and passwords.…Usually, these messages will provide links…to have a person reset their username and password,…but the information is just passed along to the attackers.…A more advanced type of phishing…will try to get people to install…malicious software on their systems.…These messages will contain malicious attachments…that will attempt to install software on a system.…
Once installed, the software often creates back doors…to the system that the attackers will use…to connect into your network,…and look for other compromise opportunities.…The other common type of software…that will be attempted to be installed is ransomware.…Malicious attachments are often sent…within a phishing email message,…and these have a higher rate of being accessed…than if a link to an alternative site…was used in the message.…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures