Editorial »

How to use the word phishing in a Sentence?

Sample usage from literary quotes and the newswire.

Filter by category:

22 results found

Bad actors have won the jackpot, previously private data such as emails, handles, and creation date can be leveraged to build smarter and more sophisticated hacking, phishing and disinformation campaigns.

Rafi Mendelsohn

Found on CNN
1 year ago

Consumers should be on the lookout for phishing and malware attacks, especially when accessing banking apps.

Wedbush Securities

Found on FOX News
2 years ago

By compromising Exchange Server, attackers are able to go directly to the source, instead of having to compromise a target via other means, such as phishing.

Sean Koessel

Found on CNN
2 years ago

We don't see any evidence of phishing for the employee whose credentials were used. We have not seen any other evidence of attacker activity before April 29.

Charles Carmakal

Found on CNN
2 years ago

It would be very hard, as a user, to see through some sort of phishing campaign when they're using information that you thought was very private to you, such as information that would be found on Facebook in your bio section, particularly, when you combine it with location information, you can see how bad guys would start to use this information in a very sinister but effective way.

Jeff Dennis

Found on CNN
3 years ago

When the first stimulus payments were released in April 2020, scammers launched a phishing campaign that impersonated the IRS, claiming that stimulus checks would be withheld unless the recipient updated their address information.

Evan Reiser

Found on FOX News
3 years ago

We’ve seen these attacks play out before, when the first stimulus payments were released in April 2020, scammers launched a phishing campaign that impersonated the IRS, claiming that stimulus checks would be withheld unless the recipient updated their address information.

Evan Reiser

Found on FOX News
3 years ago

The over 75 age group face a different challenge as they are generally considered to be less familiar with the latest digital technologies, increasing their susceptibility to scams and phishing attempts. Fraudsters are opportunists, looking for the easiest targets.

Kimberly Sutherland

Found on FOX News
3 years ago

This could be any number of techniques being used, from phishing emails [ to ] some sort of bribery.

Michael Coates

Found on CNN
3 years ago

I've never seen this volume of phishing, i am literally seeing phishing messages in every language known to man.

Marc Rogers

Found on Reuters
4 years ago

Now more than ever, people need to be even more aware of phishing emails, especially ones that refer to COVID-19 in any form or fashion whether its a cure, reports of cases, or really anything that would make people very curious.

Debbie Gordon

Found on FOX News
4 years ago

The harm can range from negligence, such as failing to secure data or clicking on a spear-phishing link, to malicious activities like theft, sabotage, espionage, unauthorized disclosure of classified information or even violence.

William Evanina

Found on Reuters
4 years ago

All organizations are vulnerable to insider threats from employees who may use their authorized access to facilities, personnel or information to harm their organizations - intentionally or unintentionally, the harm can range from negligence, such as failing to secure data or clicking on a spear-phishing link, to malicious activities like theft, sabotage, espionage, unauthorized disclosure of classified information or even violence.

William Evanina

Found on Reuters
4 years ago

We detected a potentially abnormal activity in a few employee accounts on our network due to an advanced phishing campaign.

Wipro Ltd

Found on Reuters
5 years ago

GDPR will negatively impact the overall security of the internet and will also inadvertently aid cybercriminals, by restricting access to critical information, the new law will significantly hinder investigations into cybercrime, cryptocurrency theft, phishing, ransomware, malware, fraud and crypto-jacking.

Dave Jevans

Found on Reuters
5 years ago

(That) imposes cost on them (the criminals), because they then have to reconstruct that botnet, those phishing sites, for us it's very much a bit of a call to arms across the community ... There's a lot more we can do.

David Ferbrache

Found on Reuters
6 years ago

Narang said. Other tips to keep in mind are keeping software and security patches up to date, using strong passwords, creating a different password for every website, and using two-factor authentication when possible, according to Narang. And, of course, never give out any personal information via email, social media platforms, text messages or instant messages, Narang said. Users should also enable your email provider’s spam/phishing filters and clicking on unknown links is a bad idea. Don’t even click on links, even from family or friends, if the email lacks any context or truly personal message that [would] indicate it’s real.

Jonathan Penn

Found on FOX News
7 years ago

This database will be a rich source of information for the bad guys to create very compelling, targeted spear phishing attacks and increases the likelihood of recipients opening email attachments, which renders them, and their respective organizations, highly exposed to attack.

Simon Taylor

Found on FOX News
7 years ago

Even if the data that was leaked is mostly publicly available, having one large data dump makes it easier for attackers to run attack campaigns where they send mass phishing emails to the 33.7 million unique email addresses at the impacted organizations, so while it’s important to quickly investigate this specific breach and find the root cause, it’s even more important for the impacted organizations to ensure that they have tools to be able to monitor their networks for anomalous activity and stay vigilant.

Varun Badhwar

Found on FOX News
7 years ago

A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.

James Scott

added by williamson
7 years ago

A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.

James Scott

added by issacnash
7 years ago

The Clinton Foundation reportedly hired an outside cyber security company to look at its servers after possibly being hacked. Two sources familiar with the situationtold Reuterson Wednesday that no files from Hillary and Bill Clinton’s organization have surfaced in the public. One of the sources and two other U.S. security officials told the news agency that the hackers appeared to have used ‘spear phishing’ techniques to get access to the foundation’s systems.

Ed Rendell

Found on FOX News
7 years ago

Discuss these sample sentences with the community:

0 Comments

    Are we missing a good definition for phishing? Don't keep it to yourself...

    Word of the Day

    Would you like us to send you a FREE new word definition delivered to your inbox daily?

    Please enter your email address:



    Free, no signup required:

    Add to Chrome

    Get instant definitions for any word that hits you anywhere on the web!

    Free, no signup required:

    Add to Firefox

    Get instant definitions for any word that hits you anywhere on the web!

    Browse Definitions.net

    Quiz

    Are you a words master?

    »
    a person who pays more attention to formal rules and book learning than they merit
    A crate
    B scholastic
    C abandon
    D elan