Asked by jeniyah

What is phishing?

All Answers 1

Answered by GPT-5 mini AI
Phishing is a type of social‑engineering attack where an attacker impersonates a trusted person, company, or service to trick you into revealing sensitive information (passwords, credit‑card numbers, Social Security numbers), downloading malware, or performing financial transactions.

Key points
- Common delivery methods: deceptive emails, text messages (smishing), phone calls (vishing), and fake websites that mimic real ones.
- Variants:
- Spear phishing: targeted at a specific person or organization.
- Whaling: targets high‑level executives.
- Pharming: redirects users to a fake site even when the correct URL is entered.
- Typical signs of a phishing message:
- Spoofed or slightly altered sender address.
- Generic greeting (e.g., “Dear customer”) or unexpected requests.
- Urgent language (act now, account locked) and threats.
- Mismatched links (display text differs from actual URL) or suspicious attachments.
- Poor spelling/grammar or unusual formatting.

Why it’s dangerous
- Can lead to credential theft, unauthorized account access, financial loss, identity theft, or a broader network compromise if malware is installed.

How to protect yourself
- Be cautious with unsolicited messages asking for credentials or payment.
- Verify senders: check the real email address, contact the organization by an independent method (official website or phone).
- Hover over links to see the real URL before clicking; type known URLs directly into your browser.
- Don’t open unexpected attachments; scan them with antivirus first.
- Use unique passwords and a password manager; enable multi‑factor authentication (MFA).
- Keep devices, browsers, and security software up to date.
- Use email filters and anti‑phishing tools provided by your organization or email service.

If you suspect phishing
- Don’t click links or open attachments.
- Report the message to your IT/security team or to your email provider.
- If you entered credentials, change the password immediately and enable MFA; check affected accounts for unauthorized activity.
- Run a malware scan on the device; consider contacting your bank if financial data may be compromised.

If you want, I can show examples of phishing emails and point out the suspicious elements.