What is phishing? How this cyber attack works and how to prevent it

February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Spotlight

AttackIQ

Adversaries across the globe, from nation-states to criminal organizations, hold our businesses, democracy, and society at risk through cyberspace. Our mission at AttackIQ is to help solve that problem and make the world safe for compute. As the leading independent vendor of breach and attack simulation solutions, we built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. We are trusted by leading organizations worldwide to identify security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework.

Other Infographics
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More
news image

DDoS Mitigation: Pushing Business’ Cybersecurity to New Heights

Infographic | April 17, 2023

DDoS mitigation is paramount for businesses to protect against the growing threat of DDoS attacks. Learn about the ever increasing threat of DDoS attacks, the potential impact on businesses, and mitigation techniques to safeguard against them.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Application Security: Paving the Way to Counter Emerging Cyberthreats

Infographic | June 23, 2023

Uncover essential strategies and techniques for application security and empower businesses to protect their digital assets and fortify digital defenses against emerging threats and vulnerabilities.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More

Spotlight

AttackIQ

Adversaries across the globe, from nation-states to criminal organizations, hold our businesses, democracy, and society at risk through cyberspace. Our mission at AttackIQ is to help solve that problem and make the world safe for compute. As the leading independent vendor of breach and attack simulation solutions, we built the industry’s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. We are trusted by leading organizations worldwide to identify security improvements and verify that cyberdefenses work as expected, aligned with the MITRE ATT&CK framework.

Events