A phishing cyber attack is launched through the sources you generally use such as email or the apps on your smart phones.
A phishing attack has different types such as:
Relationship between a social engineering and cyber attack?
A phishing attack is designed through a social engineering. A demand and interested is monitored of a user to launch an attack accordingly.
After analyzing the interest of a user, a well planned campaign is designed and emails, pop-up ads , cookies and attachments are sent with a malicious malware to fulfill a user's demand apparently. A reason of this process is to use a user's identity to conduct a crime electronically.
How to recognize whether the message is a real or fake?
Few most used examples of the phishing attacks:
A hacker sends an email from your friend's email which is actually hacked, and request to transfer some money that I urgently needs or like my Facebook account page. A hacker will steal your bank account information or the Facebook credentials, if you followed the instructions of the email without your knowledge.
Phony or Puny Cyber Attack Example: A web user has to be very carefully slip from an attacker who has an ability to deceive a user very cleverly. Under this attack, a hacker buys a duplicate domain name of a trademarked and famous company.
Like Apple.com or Chase.com and apparently this looks impossible to buy a same domain name which is already in use.
But, a hacker has made it possible, and it is done by a Chinese hacker recently. You will find a 100% same domain name on the internet of Apple.com with the SSL certificate and it will open in HTTPS.
How does a hacker publish a duplicate domain name on the internet?
Reserve a Company Name in the USA online if you are not ready to startThe business name reservation does not give you a right to start a business without filing and approving articles by secretary of state.