Educating The Listener On Phishing Schemes

0:00
Elearning
27
0

Description

In this DEMO, Adam Vernier explains what Phishing is and the different types of phishing schemes that hackers use and what they use your information for.

Vocal Characteristics

Language

English

Voice Age

Middle Aged (35-54)

Accents

North American (General)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
Hello. My name is Adam Bernier. Fishing is one of the most common cybersecurity threats. Today, phishing emails look innocent and disguise themselves as legitimate messages. But clicking on one can cause irreversible damage to your computer, your data and the organization you work for. How many phishing emails do you think are sent every day? Your choices are 1, 300,000 to 3 million. 3. 300 million or four? 300 billion. If you answered 12 or three, that's not correct. If you answered four, you got it. It's hard to believe. But there are over 300 billion phishing emails sent every day. And that number keeps increasing section to the word fishing comes from fishing just as people hoped to catch a fish by dangling a baited hook, Attackers hope to catch a victim by sending emails baited with intriguing offers. Or worse yet, worrying information. When you interact with the email, the attacker is able to steal your financial data, personal information or even identity phishing attacks may be carried out through many forms of messaging. Email is the most common, but text messages, phone calls and even paper mail have been used for fishing. Section three Fishing is commonly divided into four types common fishing, spear phishing clone fishing and whaling. Common phishing messages don't target any one person. Instead, they are sent in mass email blasts to thousands of people at a time. They use tricks like asking you to send prepaid gift cards or claiming you've won a prize. They may also ask you to download attached files that actually contain malware. By contrast, spear phishing targets a few specific people at a time. Spear phishers are often subtle. They send emails linking to fake log in pages designed to harvest your credentials. They disguise their messages as requests or orders from employers. Often the email has an official looking attachment, such as a spreadsheet or pdf. When you download it, you unleash malware that steals information or infects the computer