The act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account. The email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords; these details are then used by the owners of the website to conduct fraud.
The act of circumventing security with an alias.
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1995 by Jason Shannon of AST Computers. The term is a variant of fishing, probably influenced by phreaking, and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.
The numerical value of phishing in Chaldean Numerology is: 4
The numerical value of phishing in Pythagorean Numerology is: 9
Sample Sentences & Example Usage
This database will be a rich source of information for the bad guys to create very compelling, targeted spear phishing attacks and increases the likelihood of recipients opening email attachments, which renders them, and their respective organizations, highly exposed to attack.
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.
The Clinton Foundation reportedly hired an outside cyber security company to look at its servers after possibly being hacked. Two sources familiar with the situationtold Reuterson Wednesday that no files from Hillary and Bill Clinton’s organization have surfaced in the public. One of the sources and two other U.S. security officials told the news agency that the hackers appeared to have used ‘spear phishing’ techniques to get access to the foundation’s systems.
Even if the data that was leaked is mostly publicly available, having one large data dump makes it easier for attackers to run attack campaigns where they send mass phishing emails to the 33.7 million unique email addresses at the impacted organizations, so while it’s important to quickly investigate this specific breach and find the root cause, it’s even more important for the impacted organizations to ensure that they have tools to be able to monitor their networks for anomalous activity and stay vigilant.
Images & Illustrations of phishing
Translations for phishing
From our Multilingual Translation Dictionary
Get even more translations for phishing »
Find a translation for the phishing definition in other languages:
Select another language: