From Glitchdata
Jump to navigation Jump to search

When a bad actor sends and email claiming to be from a reputable and trusted source in an attempt to gain confidential information.

Code or methods utilised to extract information from a target.

  • Phishing for information


  • User Education
    • The best way to mitigate the risk of phishing is to educate users to take caution with suspicious Internet communications and not to trust them until verified. Users may require regular training to recognise suspicious web pages and email as the means and methods of threat actors evolve.