<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wikimd.org/index.php?action=history&amp;feed=atom&amp;title=Phishing</id>
	<title>Phishing - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wikimd.org/index.php?action=history&amp;feed=atom&amp;title=Phishing"/>
	<link rel="alternate" type="text/html" href="https://wikimd.org/index.php?title=Phishing&amp;action=history"/>
	<updated>2026-04-26T21:55:01Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wikimd.org/index.php?title=Phishing&amp;diff=6035061&amp;oldid=prev</id>
		<title>Prab: CSV import</title>
		<link rel="alternate" type="text/html" href="https://wikimd.org/index.php?title=Phishing&amp;diff=6035061&amp;oldid=prev"/>
		<updated>2024-12-10T21:25:55Z</updated>

		<summary type="html">&lt;p&gt;CSV import&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|A type of cybercrime involving fraudulent attempts to obtain sensitive information}}&lt;br /&gt;
{{Infobox cybersecurity&lt;br /&gt;
| name = Phishing&lt;br /&gt;
| image = Phishing.png&lt;br /&gt;
| caption = Example of a phishing email&lt;br /&gt;
| types = Email phishing, Spear phishing, Whaling, Vishing, Smishing&lt;br /&gt;
| first_reported = 1990s&lt;br /&gt;
| related = [[Cybercrime]], [[Social engineering (security)]], [[Internet fraud]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Phishing&amp;#039;&amp;#039;&amp;#039; is a form of [[cybercrime]] where attackers attempt to deceive individuals into providing sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communications. Phishing is typically carried out by email spoofing, instant messaging, and text messaging, and it often directs users to enter personal information at a fake website that matches the look and feel of the legitimate site.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The term &amp;quot;phishing&amp;quot; is a variant of &amp;quot;fishing,&amp;quot; likely influenced by the idea of &amp;quot;fishing&amp;quot; for a victim by luring them with a bait. The first recorded mention of phishing was in the mid-1990s, when hackers used AOL to steal user information. As the internet expanded, so did the prevalence and sophistication of phishing attacks.&lt;br /&gt;
&lt;br /&gt;
==Techniques==&lt;br /&gt;
Phishing techniques have evolved over time, becoming more sophisticated and harder to detect. Some common techniques include:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Email Phishing&amp;#039;&amp;#039;&amp;#039;: The most common form of phishing, where attackers send emails that appear to be from legitimate companies, often including a sense of urgency to prompt immediate action.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Spear Phishing&amp;#039;&amp;#039;&amp;#039;: A more targeted form of phishing where attackers customize their messages based on information they have gathered about the victim, making the attack more convincing.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Whaling&amp;#039;&amp;#039;&amp;#039;: A type of spear phishing that targets high-profile individuals such as executives or other senior members of an organization.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Vishing&amp;#039;&amp;#039;&amp;#039;: Phishing conducted over the phone, where attackers impersonate legitimate entities to extract sensitive information.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Smishing&amp;#039;&amp;#039;&amp;#039;: Phishing via SMS, where attackers send text messages that appear to be from legitimate sources, often containing a link to a fraudulent website.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
Preventing phishing attacks involves a combination of technology and user education. Some strategies include:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Email Filtering&amp;#039;&amp;#039;&amp;#039;: Using advanced email filtering systems to detect and block phishing emails before they reach the user.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;User Education&amp;#039;&amp;#039;&amp;#039;: Training users to recognize phishing attempts, such as checking the sender&amp;#039;s email address, looking for grammatical errors, and being cautious with links and attachments.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Two-Factor Authentication (2FA)&amp;#039;&amp;#039;&amp;#039;: Implementing 2FA to add an extra layer of security, making it harder for attackers to gain access even if they obtain a user&amp;#039;s credentials.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security Software&amp;#039;&amp;#039;&amp;#039;: Using up-to-date antivirus and anti-malware software to detect and block malicious activities.&lt;br /&gt;
&lt;br /&gt;
==Impact==&lt;br /&gt;
Phishing attacks can have severe consequences for individuals and organizations, including financial loss, identity theft, and damage to reputation. According to various reports, phishing is one of the most common and damaging forms of cybercrime, with billions of dollars lost annually.&lt;br /&gt;
&lt;br /&gt;
==Also see==&lt;br /&gt;
* [[Cybercrime]]&lt;br /&gt;
* [[Social engineering (security)]]&lt;br /&gt;
* [[Internet fraud]]&lt;br /&gt;
* [[Email spoofing]]&lt;br /&gt;
* [[Identity theft]]&lt;br /&gt;
&lt;br /&gt;
{{Cybersecurity}}&lt;br /&gt;
[[Category:Cybercrime]]&lt;br /&gt;
[[Category:Internet security]]&lt;br /&gt;
[[Category:Fraud]]&lt;/div&gt;</summary>
		<author><name>Prab</name></author>
	</entry>
</feed>