Voice phishing, or vishing, is the use of telephony (often Voice over IP telephony) to conduct phishing attacks. Landline telephone services have traditionally... 28 KB (3,386 words) - 05:50, 29 April 2024 |
Google Docs (section 2017 phishing incident) sophisticated phishing attack". The Verge. Vox Media. Retrieved May 4, 2017. Lopez, Napier (May 3, 2017). "Massive Google Docs phishing attack swept the... 32 KB (3,285 words) - 02:22, 30 April 2024 |
Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites, e-mail, or other forms used to accessing... 9 KB (937 words) - 03:24, 6 April 2024 |
Simulated phishing or a phishing test is where deceptive emails, similar to malicious emails, are sent by an organization to their own staff to gauge their... 8 KB (792 words) - 05:50, 29 April 2024 |
Rock Phish refers to both a phishing toolkit/technique and the group behind it. At one time the Rock Phish group was stated to be behind "one-half of... 4 KB (420 words) - 05:50, 29 April 2024 |
The list of phishing incidents covers important or noteworthy events in the history of phishing. 1984 An early phishing incident was documented at the... 48 KB (3,946 words) - 05:49, 29 April 2024 |
In-session phishing is a form of potential phishing attack which relies on one web browsing session being able to detect the presence of another session... 3 KB (276 words) - 05:49, 29 April 2024 |
The Anti-Phishing Working Group (APWG) is an international consortium that attempts to eliminate fraud and identity theft caused by phishing and related... 2 KB (156 words) - 17:54, 20 March 2023 |