What is Phishing?
This webinar will help us understand:
What is a Social Engineering attack? 
Security is Everyone's Responsibility – If you see something fishy, do something about it!
What is Phishing? 
An article in Forbes in August 2014 argues that 
the reason phishing problems persist even after a 
decade of anti-phishing technologies being sold 
is that phishing is "a technological medium to 
exploit human weaknesses" and that technology 
cannot fully compensate for human weaknesses. 
Security is Everyone's Responsibility – If you see something fishy, talk & do something about it!
Notable Phishing Attacks 
phishing attack 
phishing attack 
Source – Wikipedia (Article – Phishing)
Types of Phishing Attacks
Types of Phishing Attacks 
Spear 
Phishing 
Clone 
Phishing 
Clone phishing is a type of 
phishing attack where a hacker 
tries to clone a website that his 
victim usually visits. The cloned 
website usually asks for login 
credentials, mimicking the real 
website.
Types of Phishing Attacks 
Whaling
Types of Phishing Attacks 
Voice 
Phishing 
SmShing 
A phishing attack wherein a 
victim receives an SMS that 
claims to be from a reputable 
source and asks for their 
personal information.
How to Identify a Phishing Attack
How to Identify a Phishing Attack 
1) Generic Greeting 
2) Fake Sender’s Address 
3) False Sense of Urgency 
4) Unusual URLs 
5) Emails that appear like a 
webpage 
6) Spelling and Grammatical 
Errors
How to Avoid Phishing Attacks
How to Avoid Phishing Attacks (Contd..)
How to Avoid Phishing Attacks (Contd..)
Quick Heal Anti-phishing Security Features: 
automatic protection against threats such as 
phishing, identity theft, key loggers, etc.
Quick Heal Anti-phishing Security Features:
Quick Heal Anti-phishing Security Features:
Key Message! 
There is no silver bullet for 
phishing attacks or cybercrime 
for that matter. But taking the 
right precautionary measures, 
seeking help from the right 
authorities, and using the right 
security solution, do place us at 
a safer spot.
corporatecommunication@quickheal.co.in 
Follow us on: 
www.facebook.com/quickhealav 
www.twitter.com/quickheal 
www.quickheal.com 
www.blogs.quickheal.com
Content sources: 
https://security.intuit.com/phishing.html 
http://en.wikipedia.org/wiki/Phishing 
http://blog.lifestore.aol.com/2013/01/07/smshing-or-smishing/ 
http://resources.infosecinstitute.com/phishing-and-social-engineering-techniques/ 
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx

What is Phishing and How can you Avoid it?

  • 1.
  • 2.
    This webinar willhelp us understand:
  • 3.
    What is aSocial Engineering attack? Security is Everyone's Responsibility – If you see something fishy, do something about it!
  • 4.
    What is Phishing? An article in Forbes in August 2014 argues that the reason phishing problems persist even after a decade of anti-phishing technologies being sold is that phishing is "a technological medium to exploit human weaknesses" and that technology cannot fully compensate for human weaknesses. Security is Everyone's Responsibility – If you see something fishy, talk & do something about it!
  • 5.
    Notable Phishing Attacks phishing attack phishing attack Source – Wikipedia (Article – Phishing)
  • 6.
  • 7.
    Types of PhishingAttacks Spear Phishing Clone Phishing Clone phishing is a type of phishing attack where a hacker tries to clone a website that his victim usually visits. The cloned website usually asks for login credentials, mimicking the real website.
  • 8.
    Types of PhishingAttacks Whaling
  • 9.
    Types of PhishingAttacks Voice Phishing SmShing A phishing attack wherein a victim receives an SMS that claims to be from a reputable source and asks for their personal information.
  • 10.
    How to Identifya Phishing Attack
  • 11.
    How to Identifya Phishing Attack 1) Generic Greeting 2) Fake Sender’s Address 3) False Sense of Urgency 4) Unusual URLs 5) Emails that appear like a webpage 6) Spelling and Grammatical Errors
  • 12.
    How to AvoidPhishing Attacks
  • 13.
    How to AvoidPhishing Attacks (Contd..)
  • 14.
    How to AvoidPhishing Attacks (Contd..)
  • 15.
    Quick Heal Anti-phishingSecurity Features: automatic protection against threats such as phishing, identity theft, key loggers, etc.
  • 16.
    Quick Heal Anti-phishingSecurity Features:
  • 17.
    Quick Heal Anti-phishingSecurity Features:
  • 18.
    Key Message! Thereis no silver bullet for phishing attacks or cybercrime for that matter. But taking the right precautionary measures, seeking help from the right authorities, and using the right security solution, do place us at a safer spot.
  • 19.
    corporatecommunication@quickheal.co.in Follow uson: www.facebook.com/quickhealav www.twitter.com/quickheal www.quickheal.com www.blogs.quickheal.com
  • 20.
    Content sources: https://security.intuit.com/phishing.html http://en.wikipedia.org/wiki/Phishing http://blog.lifestore.aol.com/2013/01/07/smshing-or-smishing/ http://resources.infosecinstitute.com/phishing-and-social-engineering-techniques/ http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx