Want to create interactive content? It’s easy in Genially!
Pitch Genial
IVÁN GUTIÉRREZ OQUENDO
Created on March 21, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
PHISING
6.
5.
4.
3.
2.
1.
bibliograpy
opinion personal
risky phising
video phising
contents
introduction
Una presentación genial es clara y estructurada
index
Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.
INTRODUCTION
- Cyber attack launched through email and that impersonates the identity of large companies, organizations or senior officials.
- social engineering technique used by cybercriminals to fraudulently obtain confidential information from users and thus appropriate the identity of those people.
- Types of phishing attacks range from classic email scams to more creative approaches such as spear phishing and smishing. They all have the same goal – to steal your personal data.
CONTENTS
Video Phising
Phising Telephone
Currently, there is little protection against phishing, a type of cyber attack in which criminals clone a legitimate application or website to obtain users' private data, and for that reason, Google is taking action on the matter. preparing Android to detect applications.
Although the term phishing is a general term that refers to cyberattacks that are carried out via email, text messages, or phone calls, some people may wonder what targeted phishing attacks are called. The answer is spear phishing.
Physing attack
Detect phishing
- Check the sender's name and address.
- Pay attention to the courtesy formula.
- Observe spelling and grammar.
- Pay attention to possible traps in the form of links
- Do not fill out any forms by email.
- Be careful with attachments.
Risky Phishing
Be victims of money theft from your bank accounts. Fraudulent charges on your credit cards. Lose access to your file folders, photos and more.videos y archivos, o incluso que los ciberdelincuentes se hagan pasar por ti y pongan a los demás en peligro.
- Protect your computer by using security software.
- Protect your cell phone by setting software to update automatically.
- Protect your accounts by using multi-factor authentication.
The goal of Spear phishing is to acquire sensitive information, such as usernames, passwords, and other personal information. When a link is opened in a phishing email, it can open a malicious site, which could download unwanted information to a user's computer.
SUMMARY
My opinion about phishing is that much more attention should be paid to having more security on the mobile and that when people see this they should report it directly and not get involved in anything because there is when they can steal your data and the things that you have inside of the mobile
Personal Opinion
- https://es.malwarebytes.com/phishing/#:~:text=Suplantaci%C3%B3n%20de%20identidad%20(phishing),correo%20electr%C3%B3nico%20o%20llamada%20telef%C3%B3nica.
- https://www.incibe.es/aprendeciberseguridad/phishing
- https://www.comptia.org/content/articles/what-is-phishing#other