SlideShare a Scribd company logo
Phishing
What is phishing?
๏ต Phishing is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to
lure individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Some examples
Types of phishing
๏ต Deceptive phishing Spear phishing
Ceo fraud Google docs phishing
Difference betweeen Phishing and
Spoofing
One downloads malware to your computer or network, and the other tricks you
into giving up sensitive financial information to a cyber crook.
How prevent
Donโ€™t give your personal information.
Never respond to email that request personal finacial information.
Keep a regular check on your account.
Visit Banks websites by typing the URL into the address bar.
Protect your computer, or phones with a antivirus software.
๏ต Donโ€™ t give your personal information
๏ต Save evidence
๏ต Check your bank account
๏ต Donโ€™t respond strange emails
๏ต Donโ€™t pick up the links of strange emails
๏ต Donโ€™t send compromise photos
๏ต Donโ€™t talk with strangers
๏ต Donโ€™t save credits information in your computer or your phones
๏ต Donโ€™t give your password to anyone
๏ต Donโ€™t public all your life on social networks

More Related Content

What's hot

Phishing
PhishingPhishing
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
Narendra Singh
ย 
Phishing
PhishingPhishing
Phishing
oitaoming
ย 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
ย 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
seema Vishwakarma
ย 
Phishing work
Phishing workPhishing work
Phishing work
AhmadThaqifAimanAhma
ย 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
ย 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
Jeffavery9
ย 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
Jeffavery99
ย 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
Sara Gallaher Richardson
ย 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
PropLogix
ย 
Phishing
PhishingPhishing
Phishing
NurulFatihah106
ย 
Phishing
PhishingPhishing
Phishing
NurulAliza1
ย 
101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen
Acuant
ย 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
mariotoronto
ย 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
Justin Saunders
ย 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
ย 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
ย 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
ย 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
- Mark - Fullbright
ย 

What's hot (20)

Phishing
PhishingPhishing
Phishing
ย 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
ย 
Phishing
PhishingPhishing
Phishing
ย 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
ย 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
ย 
Phishing work
Phishing workPhishing work
Phishing work
ย 
Phishing
PhishingPhishing
Phishing
ย 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
ย 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
ย 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
ย 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
ย 
Phishing
PhishingPhishing
Phishing
ย 
Phishing
PhishingPhishing
Phishing
ย 
101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen
ย 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
ย 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
ย 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
ย 
Phishing
PhishingPhishing
Phishing
ย 
Identity theft
Identity theftIdentity theft
Identity theft
ย 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
ย 

Similar to Phishing

Phishing
PhishingPhishing
Phishing
guicelacatalina
ย 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
ย 
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
watchyourpocketbusin
ย 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
ย 
Phishing
PhishingPhishing
Phishing
AmirIzzudin1
ย 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
ย 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
ย 
Phishing
PhishingPhishing
Phishing
Claudia Pรฉrez
ย 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
ย 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
Dale Rapp
ย 
Identity theft
Identity theftIdentity theft
Identity theft
Ashley Arkfeld
ย 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
ย 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore
ย 
Phishing
PhishingPhishing
Phishing
Deepak Kumar (D3)
ย 
Pishing
PishingPishing
Pishing
criostap
ย 
Pishing
PishingPishing
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
guest1daf5af
ย 
Phising
PhisingPhising
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
ย 
Phishing
PhishingPhishing
Phishing
Sagar Rai
ย 

Similar to Phishing (20)

Phishing
PhishingPhishing
Phishing
ย 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
ย 
A Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdfA Deep Dive into Phishing Techniques and Countermeasures.pdf
A Deep Dive into Phishing Techniques and Countermeasures.pdf
ย 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
ย 
Phishing
PhishingPhishing
Phishing
ย 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
ย 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
ย 
Phishing
PhishingPhishing
Phishing
ย 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
ย 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
ย 
Identity theft
Identity theftIdentity theft
Identity theft
ย 
Identity theft
Identity theftIdentity theft
Identity theft
ย 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
ย 
Phishing
PhishingPhishing
Phishing
ย 
Pishing
PishingPishing
Pishing
ย 
Pishing
PishingPishing
Pishing
ย 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
ย 
Phising
PhisingPhising
Phising
ย 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
ย 
Phishing
PhishingPhishing
Phishing
ย 

Recently uploaded

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
ย 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
ย 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ
ย 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
ย 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
ย 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
ย 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
ย 
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdfA Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixรฃo
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
Nguyen Thanh Tu Collection
ย 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
ย 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
ย 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
ย 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
ย 

Recently uploaded (20)

NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
ย 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
ย 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
ย 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
ย 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
ย 
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdfู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ   ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ู…ุตุญู ุงู„ู‚ุฑุงุกุงุช ุงู„ุนุดุฑ ุฃุนุฏ ุฃุญุฑู ุงู„ุฎู„ุงู ุณู…ูŠุฑ ุจุณูŠูˆู†ูŠ.pdf
ย 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
ย 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ย 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
ย 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
ย 
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdfA Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
A Independรชncia da Amรฉrica Espanhola LAPBOOK.pdf
ย 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH 8 Cแบข Nฤ‚M - GLOBAL SUCCESS - Nฤ‚M HแปŒC 2023-2024 (Cร“ FI...
ย 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
ย 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
ย 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
ย 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
ย 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
ย 

Phishing

  • 2. What is phishing? ๏ต Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
  • 4. Types of phishing ๏ต Deceptive phishing Spear phishing Ceo fraud Google docs phishing
  • 5. Difference betweeen Phishing and Spoofing One downloads malware to your computer or network, and the other tricks you into giving up sensitive financial information to a cyber crook.
  • 6. How prevent Donโ€™t give your personal information. Never respond to email that request personal finacial information. Keep a regular check on your account. Visit Banks websites by typing the URL into the address bar. Protect your computer, or phones with a antivirus software.
  • 7. ๏ต Donโ€™ t give your personal information ๏ต Save evidence ๏ต Check your bank account ๏ต Donโ€™t respond strange emails ๏ต Donโ€™t pick up the links of strange emails ๏ต Donโ€™t send compromise photos ๏ต Donโ€™t talk with strangers ๏ต Donโ€™t save credits information in your computer or your phones ๏ต Donโ€™t give your password to anyone ๏ต Donโ€™t public all your life on social networks