Phishing – Deceptive attempts to steal personal information via fake emails, messages, or websites.
Spear Phishing – A targeted phishing attack aimed at specific individuals or organizations.
Whaling – A type of spear phishing aimed at high-profile targets like CEOs or executives.
Smishing – Phishing attacks carried out through SMS (text messages).
Vishing – Phishing conducted over the phone (voice phishing).
Clone Phishing – An attack where a legitimate email is copied and altered with malicious links or attachments.
Spoofing – Faking an email address, phone number, or website to appear as a trusted source.
Payload – The harmful element (like malware) delivered in a phishing attack.
Malware – Malicious software designed to damage or steal information, often delivered through phishing.
Ransomware – A type of malware that locks users out of their systems or data until a ransom is paid.
Keylogger – Software or hardware that records keystrokes to steal sensitive information such as passwords or credit card numbers.
Pretexting – A social engineering attack where the attacker creates a fake scenario to steal personal information.
Baiting – Using the promise of a reward (like free software) to trick people into revealing personal information or installing malware.
Quid Pro Quo – An attack that offers something in exchange for information, like posing as tech support offering help in exchange for access credentials.
Impersonation – Pretending to be someone else to gain information, like posing as an employee or trusted partner.
Typosquatting – Registering domain names similar to legitimate sites to trick people into visiting fake websites.
Watering Hole Attack – Compromising a website frequently visited by a target group in order to infect its users with malware.
Credential Harvesting – Phishing attacks designed specifically to steal login credentials.
Keylogger – Software or hardware that tracks keystrokes on a victim’s computer to capture sensitive information.
Man-in-the-Middle Attack (MITM) – Intercepting communication between two parties to steal or alter information.
Business Email Compromise (BEC) – A phishing attack that targets businesses to steal financial information or money.
Reconnaissance – The phase where an attacker gathers information about a target before launching a phishing or social engineering attack.
Shoulder Surfing – A technique where attackers watch over someone’s shoulder to gain personal information, such as passwords.
Social Engineering – Manipulating people into giving up confidential information or performing actions that may compromise security.
Keylogger – Software or hardware that tracks keystrokes on a victim’s computer to capture sensitive information.