A phishing cyber attack is launched through the sources you generally use such as email or the apps on your smart phones.
A phishing attack has different types such as:
Relationship between a social engineering and cyber attack?
A phishing attack is designed through a social engineering. A demand and interested is monitored of a user to launch an attack accordingly.
After analyzing the interest of a user, a well planned campaign is designed and emails, pop-up ads , cookies and attachments are sent with a malicious malware to fulfill a user's demand apparently. A reason of this process is to use a user's identity to conduct a crime electronically.
How to recognize whether the message is a real or fake?
Few most used examples of the phishing attacks:
A hacker sends an email from your friend's email which is actually hacked, and request to transfer some money that I urgently needs or like my Facebook account page. A hacker will steal your bank account information or the Facebook credentials, if you followed the instructions of the email without your knowledge.
Phony or Puny Cyber Attack Example: A web user has to be very carefully slip from an attacker who has an ability to deceive a user very cleverly. Under this attack, a hacker buys a duplicate domain name of a trademarked and famous company.
Like Apple.com or Chase.com and apparently this looks impossible to buy a same domain name which is already in use.
But, a hacker has made it possible, and it is done by a Chinese hacker recently. You will find a 100% same domain name on the internet of Apple.com with the SSL certificate and it will open in HTTPS.
How does a hacker publish a duplicate domain name on the internet?
Initial Report Filing is required for the new business registrationFile Initial Report Filings or Statement of Information within thirty days of the company being formed such as Alabama, Nevada, Georgia, Alaska, WA