SlideShare a Scribd company logo
1 of 19
Phishing
History and Definitions
History
• In 2004 the first Phishing lawsuit was filed in
California against a 17-year-old who had constructed
a false copy of a well known website, “America
Online”.
• In creating this fake website the young man was able
to obtain credit card details from users, which he then
used to withdraw money from their accounts.
3
Definition
• Phishing is a cybercrime where individuals are
targeted via email, text messages or phone calls in
order to retrieve private information.
• Information acquired can be passwords, documents
pertaining to identification, or credit cards and
banking information.
4
Perpetrators
often pose as
legitimate
organizations
Phone calls
• “Vishing” (Voice Phishing) is the telephone version of
Phishing.
• This method of Phishing aims to verbally coerce a
user into revealing sensitive information, with most
cases ending in identity theft.
5
Text Messages
• Text Message Phishing is also known as “Smishing”
(SMS Phishing).
• When a “phish” occurs, cybercriminals send deceptive
messages that attempt to persuade individuals into
clicking harmful links or opening malicious
attachments.
6
“Smishing” seeks
to accomplish
these tasks yet
use text
messaging
platforms as a
medium.
Examples of “Smishing”
7
Do any of these
texts seem
suspicious?
Email
Common signs of a Phishing email are:
• Unidentified senders.
• When the email seems too good to be true.
• There is a sense of urgency for the target to respond.
• Contains suspicious looking links or attachments.
8
Phishing scams
are found
commonly in
emails.
Email Phishing Example
9
Does anything
seem suspicious
about this email?
Identifying Phishing Emails
Unknown Senders
• When receiving emails be on
alert for unfamiliar senders.
• Even if the email is from a
known contact, be aware if
the content of the email
seems out of the ordinary or
unexpected, it could be a
scheme.
11
Urgency
• Some email content may
pressure you to respond fast or
claim that an account or
subscription you hold will be
suspended.
• It is beneficial to be mindful of
the urgency within an email, this
is a primary sign of a Phishing
scam.
12
To Good to be True
• Phishing emails can contain
promising rewards for the
designated target.
• Suspicious attention-
grabbing emails often
guarantee the recipients
that they will receive items
or cash prizes.
13
Attachments & Hyperlinks
• In Phishing emails it is common to see
attachments or links requesting your attention.
• Be cautious of suspicious looking links or
attachments.
14
Think before you
click!
Preventative Measures
Preventative Measures
• Delete suspiciously “urgent” looking emails.
• Utilizing spam filters. Filters can determine the source
and software used in creating spam emails.
Additionally, filters may also block legitimate sources,
therefore it is not completely accurate.
16
There are a
number of ways
to avoid being
caught by
Phishing scams.
Preventative Measures Continued
• Change passwords regularly for accounts and never
use the same password for every account.
• Utilize the number of security awareness training
sessions and materials that may be available.
• Avoid using public networks when accessing sensitive
information such as identification documents and
banking platforms.
17
There are a
number of ways
to avoid being
caught by
Phishing scams.
Preventative Measures Continued
• If attachments are present, refrain from downloading
suspicious documents, .txt files are the only safe file
to download.
• If there are hyperlinks, hover over the URL, the link
may direct to a different site completely. Pay
attention to URL spelling, small changes in a valid
looking link may go unnoticed.
 Example: “google.com” vs “goggle.com”
18
There are a
number of ways
to avoid being
caught by
Phishing scams.
Preventative Measures Continued
• Configure browsing settings to avert deceitful
websites from opening. Secure websites begin with
“https:”. All sites will ultimately be required to have
valid security protocols in place.
• Be aware that a bank will not request personal
verification via email. Banks will not request an
individual to update their account within a designated
time period.
19
There are a
number of ways
to avoid being
caught by
Phishing scams.

More Related Content

Similar to History, Definitions, and Prevention of Phishing Scams

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxSultan593473
 

Similar to History, Definitions, and Prevention of Phishing Scams (20)

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Phishing
PhishingPhishing
Phishing
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing
PhishingPhishing
Phishing
 
How to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptxHow to Recognize a Fake Email.pptx
How to Recognize a Fake Email.pptx
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

History, Definitions, and Prevention of Phishing Scams

  • 3. History • In 2004 the first Phishing lawsuit was filed in California against a 17-year-old who had constructed a false copy of a well known website, “America Online”. • In creating this fake website the young man was able to obtain credit card details from users, which he then used to withdraw money from their accounts. 3
  • 4. Definition • Phishing is a cybercrime where individuals are targeted via email, text messages or phone calls in order to retrieve private information. • Information acquired can be passwords, documents pertaining to identification, or credit cards and banking information. 4 Perpetrators often pose as legitimate organizations
  • 5. Phone calls • “Vishing” (Voice Phishing) is the telephone version of Phishing. • This method of Phishing aims to verbally coerce a user into revealing sensitive information, with most cases ending in identity theft. 5
  • 6. Text Messages • Text Message Phishing is also known as “Smishing” (SMS Phishing). • When a “phish” occurs, cybercriminals send deceptive messages that attempt to persuade individuals into clicking harmful links or opening malicious attachments. 6 “Smishing” seeks to accomplish these tasks yet use text messaging platforms as a medium.
  • 7. Examples of “Smishing” 7 Do any of these texts seem suspicious?
  • 8. Email Common signs of a Phishing email are: • Unidentified senders. • When the email seems too good to be true. • There is a sense of urgency for the target to respond. • Contains suspicious looking links or attachments. 8 Phishing scams are found commonly in emails.
  • 9. Email Phishing Example 9 Does anything seem suspicious about this email?
  • 11. Unknown Senders • When receiving emails be on alert for unfamiliar senders. • Even if the email is from a known contact, be aware if the content of the email seems out of the ordinary or unexpected, it could be a scheme. 11
  • 12. Urgency • Some email content may pressure you to respond fast or claim that an account or subscription you hold will be suspended. • It is beneficial to be mindful of the urgency within an email, this is a primary sign of a Phishing scam. 12
  • 13. To Good to be True • Phishing emails can contain promising rewards for the designated target. • Suspicious attention- grabbing emails often guarantee the recipients that they will receive items or cash prizes. 13
  • 14. Attachments & Hyperlinks • In Phishing emails it is common to see attachments or links requesting your attention. • Be cautious of suspicious looking links or attachments. 14 Think before you click!
  • 16. Preventative Measures • Delete suspiciously “urgent” looking emails. • Utilizing spam filters. Filters can determine the source and software used in creating spam emails. Additionally, filters may also block legitimate sources, therefore it is not completely accurate. 16 There are a number of ways to avoid being caught by Phishing scams.
  • 17. Preventative Measures Continued • Change passwords regularly for accounts and never use the same password for every account. • Utilize the number of security awareness training sessions and materials that may be available. • Avoid using public networks when accessing sensitive information such as identification documents and banking platforms. 17 There are a number of ways to avoid being caught by Phishing scams.
  • 18. Preventative Measures Continued • If attachments are present, refrain from downloading suspicious documents, .txt files are the only safe file to download. • If there are hyperlinks, hover over the URL, the link may direct to a different site completely. Pay attention to URL spelling, small changes in a valid looking link may go unnoticed.  Example: “google.com” vs “goggle.com” 18 There are a number of ways to avoid being caught by Phishing scams.
  • 19. Preventative Measures Continued • Configure browsing settings to avert deceitful websites from opening. Secure websites begin with “https:”. All sites will ultimately be required to have valid security protocols in place. • Be aware that a bank will not request personal verification via email. Banks will not request an individual to update their account within a designated time period. 19 There are a number of ways to avoid being caught by Phishing scams.

Editor's Notes

  1. References: https://www.phishing.org/what-is-phishing
  2. References: https://www.phishing.org/what-is-phishing
  3. References: https://whatismyipaddress.com/vishing
  4. References: https://www.phishing.org/what-is-phishing
  5. References: https://www.welivesecurity.com/2016/11/10/apple-id-smishing-evolves-lure-victims/ https://www.digitaltrends.com/computing/smishing-threat-targets-phones-by-text-message/
  6. References: https://www.phishing.org/what-is-phishing
  7. References: https://www.wellsfargo.com/privacy-security/fraud/report/phish/ https://www.vadesecure.com/en/anatomy-of-a-phishing-email/
  8. References: https://www.phishing.org/what-is-phishing https://blogs.vcu.edu/phishing/how-to-identify-scams/
  9. References: https://www.phishing.org/what-is-phishing https://www.hoax-slayer.net/urgent-server-warning/
  10. References: https://www.phishing.org/what-is-phishing https://sites.udel.edu/threat/2013/12/04/voucher-for-one-free-scam/
  11. References: https://www.phishing.org/what-is-phishing https://www.brock-it.ca/phishing-think-before-you-click/
  12. References: https://www.phishing.org/what-is-phishing
  13. References: https://www.phishing.org/what-is-phishing
  14. References: https://www.phishing.org/what-is-phishing
  15. References: https://www.phishing.org/what-is-phishing