书目名称 | Phishing and Communication Channels | 副标题 | A Guide to Identifyi | 编辑 | Gunikhan Sonowal | 视频video | | 概述 | Helps you identify different types of phishing attacks without installing any anti-phishing software.Discusses how to mitigate dangers posted by phishing activities.Shows how to implement the latest m | 图书封面 |  | 描述 | .Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels...The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. .Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack...This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks..What You Will Learn..Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing.Know which communications are most commonly used, including | 出版日期 | Book 2022 | 关键词 | Phishing; Social engineering attack; Spear phishing; Smishing (sms phishing); Vishing(voice phishing); Wh | 版次 | 1 | doi | https://doi.org/10.1007/978-1-4842-7744-7 | isbn_softcover | 978-1-4842-7743-0 | isbn_ebook | 978-1-4842-7744-7 | copyright | Gunikhan Sonowal 2022 |
The information of publication is updating
|
|