Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. [1]

193 relations: Address bar, Adobe Flash, Advanced persistent threat, American Express, Anti-Phishing Act of 2005, Anti-Phishing Working Group, AOHell, AOL, Bait (luring substance), Bank of America, Bank of Ireland, Bill (law), Bitcoin, Black hat, Blacklist (computing), Brandjacking, Brazil, Bundestag, California, CAN-SPAM Act of 2003, Certificate authority, Charles H. Eccleston, Christian Democratic Union of Germany, Citibank, Clickjacking, Computer worm, Confidence trick, Connecticut, Copyright infringement, Cozy Bear, Credit card, Cross-site scripting, CryptoLocker, Cyberattack, Cyscon, Deutsche Welle, DNS hijacking, Domain Name System, Duke University School of Law, E-commerce payment system, E-gold, EarthLink, Electronic Frontier Foundation, Eliot Higgins, Email, Email filtering, Email spoofing, Euro, European Parliament, European Parliament Committee on Foreign Affairs, ..., Evil twin (wireless networks), Facebook, Fake news, Fake news website, Fancy Bear, Federal Bureau of Investigation, Federal Trade Commission, Firefox, Firefox 2, Fishing, Forbes, Fraud Act 2006, FraudWatch International, GeoTrust, Google, Google Chrome, Google Docs, Sheets, and Slides, Google Safe Browsing, Government of Australia, Harvard University, Hewlett-Packard, Hillary Clinton, Homophone, Honeynet Project, Hosts (file), HTML element, Hyperlink, ICANN, ICloud leaks of celebrity photos, Identity theft, IDN homograph attack, In-session phishing, Information sensitivity, Instant messaging, Intelligent word recognition, Internal Revenue Service, International Business Times, Internationalized domain name, Internet Explorer, Internet Explorer 7, Internet fraud, Internet service provider, Israeli Civil Administration, Java (programming language), JavaScript, John Doe, Legislation, List of cognitive biases, Look and feel, Machine learning, Mail and wire fraud, Malaysia Airlines Flight 17, Malware, Man-in-the-middle attack, Metropolitan Police Service, Microsoft, Mobile app, Money, Multi-factor authentication, Mutual authentication, Myspace, Nanyang Technological University, NATO, Natural language processing, Neologism, Nordea, OAuth, Online auction, OpenID, Opera (web browser), Optical character recognition, Organized crime, Outbrain, Patrick Leahy, Payment card number, PayPal, Penetration test, People's Liberation Army, Petya (malware), Pharming, Phishing, PhishTank, Phreaking, Pointer (user interface), Ransomware, RapidShare, Remote access trojan, Rock Phish, Russian Business Network, Saarland, Safari (web browser), Sahra Wagenknecht, Saint Petersburg, SecureWorks, Security hacker, September 11 attacks, SiteKey, SMS phishing, Social engineering (security), Social networking service, Social Security number, Spoofing attack, Tabnabbing, Target Corporation, TD Ameritrade, Telecommunication, The Banker, The Home Depot, The Left (Germany), The Mercury News, The Pentagon, The Washington Post, The Wichita Eagle, ThreatConnect, Transport Layer Security, Typosquatting, UK Payments Administration, United Kingdom, United States, United States Congress, United States District Court for the Western District of Washington, United States elections, 2016, United States Military Academy, United States Secret Service, United States Senate, University of Kansas, URL, URL redirection, User (computing), Utica College, Voice over IP, Voice phishing, WannaCry ransomware attack, Warez, Warez scene, Web browser, Website spoofing, White House, White-collar crime, Whitelisting, World Anti-Doping Agency, Young Union, 1,000,000,000. Expand index (143 more) »

Address bar

In a web browser, the address bar (also location bar or URL bar) is a graphical control element that shows the current URL.

New!!: Phishing and Address bar · See more »

Adobe Flash

Adobe Flash is a deprecated multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications, mobile games and embedded web browser video players.

New!!: Phishing and Adobe Flash · See more »

Advanced persistent threat

An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity.

New!!: Phishing and Advanced persistent threat · See more »

American Express

The American Express Company, also known as Amex, is an American multinational financial services corporation headquartered in Three World Financial Center in New York City.

New!!: Phishing and American Express · See more »

Anti-Phishing Act of 2005

The Anti-Phishing Act of 2005 (Long title: "A bill to criminalize Internet scams involving fraudulently obtaining personal information, commonly known as phishing.") was a United States bill to combat phishing and pharming.

New!!: Phishing and Anti-Phishing Act of 2005 · See more »

Anti-Phishing Working Group

The Anti-Phishing Working Group (APWG) is an international consortium that brings together businesses affected by phishing attacks, security products and services companies, law enforcement agencies, government agencies, trade association, regional international treaty organizations and communications companies.

New!!: Phishing and Anti-Phishing Working Group · See more »


AOHell was a Windows application that was used to simplify 'cracking' using AOL.

New!!: Phishing and AOHell · See more »


AOL (formerly a company known as AOL Inc., originally known as America Online, and stylized as Aol.) is a web portal and online service provider based in New York.

New!!: Phishing and AOL · See more »

Bait (luring substance)

Bait is any substance used to attract prey, e.g. in a mousetrap.

New!!: Phishing and Bait (luring substance) · See more »

Bank of America

Bank of America Corporation (abbreviated as BofA) is an American multinational financial services company headquartered in Charlotte, North Carolina.

New!!: Phishing and Bank of America · See more »

Bank of Ireland

The Bank of Ireland (Banc na hÉireann) is a commercial bank operation in Ireland and one of the traditional 'Big Four' Irish banks.

New!!: Phishing and Bank of Ireland · See more »

Bill (law)

A bill is proposed legislation under consideration by a legislature.

New!!: Phishing and Bill (law) · See more »


Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.

New!!: Phishing and Bitcoin · See more »

Black hat

A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".

New!!: Phishing and Black hat · See more »

Blacklist (computing)

In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned.

New!!: Phishing and Blacklist (computing) · See more »


Brandjacking is an activity whereby someone acquires or otherwise assumes the online identity of another entity for the purposes of acquiring that person's or business's brand equity.

New!!: Phishing and Brandjacking · See more »


Brazil (Brasil), officially the Federative Republic of Brazil (República Federativa do Brasil), is the largest country in both South America and Latin America.

New!!: Phishing and Brazil · See more »


The Bundestag ("Federal Diet") is the German federal parliament.

New!!: Phishing and Bundestag · See more »


California is a state in the Pacific Region of the United States.

New!!: Phishing and California · See more »

CAN-SPAM Act of 2003

The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003, signed into law by President George W. Bush on December 16, 2003, established the United States' first national standards for the sending of commercial e-mail and requires the Federal Trade Commission (FTC) to enforce its provisions.

New!!: Phishing and CAN-SPAM Act of 2003 · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: Phishing and Certificate authority · See more »

Charles H. Eccleston

Charles H. Eccleston is an American author, consultant and lecturer in US National Environmental Policy Act (NEPA).

New!!: Phishing and Charles H. Eccleston · See more »

Christian Democratic Union of Germany

The Christian Democratic Union of Germany (Christlich Demokratische Union Deutschlands, CDU) is a Christian democratic and liberal-conservative political party in Germany.

New!!: Phishing and Christian Democratic Union of Germany · See more »


Citibank is the consumer division of financial services multinational Citigroup.

New!!: Phishing and Citibank · See more »


Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.

New!!: Phishing and Clickjacking · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Phishing and Computer worm · See more »

Confidence trick

A confidence trick (synonyms include con, confidence game, confidence scheme, ripoff, scam and stratagem) is an attempt to defraud a person or group after first gaining their confidence, used in the classical sense of trust.

New!!: Phishing and Confidence trick · See more »


Connecticut is the southernmost state in the New England region of the northeastern United States.

New!!: Phishing and Connecticut · See more »

Copyright infringement

Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

New!!: Phishing and Copyright infringement · See more »

Cozy Bear

Cozy Bear, classified as advanced persistent threat APT29, is a Russian hacker group believed to be associated with Russian intelligence.

New!!: Phishing and Cozy Bear · See more »

Credit card

A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

New!!: Phishing and Credit card · See more »

Cross-site scripting

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.

New!!: Phishing and Cross-site scripting · See more »


The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014.

New!!: Phishing and CryptoLocker · See more »


A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Phishing and Cyberattack · See more »


cyscon GmbH is an IT consultancy with its main headquarters in Düsseldorf, Germany by Thorsten Kraft and Thomas Wolf.

New!!: Phishing and Cyscon · See more »

Deutsche Welle

Deutsche Welle ("German wave" in German) or DW is Germany's public international broadcaster.

New!!: Phishing and Deutsche Welle · See more »

DNS hijacking

DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries.

New!!: Phishing and DNS hijacking · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Phishing and Domain Name System · See more »

Duke University School of Law

Duke University School of Law (also known as Duke Law School or Duke Law) is the law school and a constituent academic unit of Duke University, Durham, North Carolina, United States.

New!!: Phishing and Duke University School of Law · See more »

E-commerce payment system

An e-commerce payment system facilitates the acceptance of electronic payment for online transactions.

New!!: Phishing and E-commerce payment system · See more »


E-gold was a digital gold currency operated by Gold & Silver Reserve Inc.

New!!: Phishing and E-gold · See more »


EarthLink is an IT services, network and communications provider headquartered in Atlanta, Georgia.

New!!: Phishing and EarthLink · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: Phishing and Electronic Frontier Foundation · See more »

Eliot Higgins

Eliot Ward Higgins (born January 1979), who previously used the pseudonym Brown Moses, is a British citizen journalist and blogger, known for using open sources and social media to investigate the Syrian Civil War, 2014–15 Russian military intervention in Ukraine and the downing of Malaysia Airlines Flight 17.

New!!: Phishing and Eliot Higgins · See more »


Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Phishing and Email · See more »

Email filtering

Email filtering is the processing of email to organize it according to specified criteria.

New!!: Phishing and Email filtering · See more »

Email spoofing

Email spoofing is the creation of email messages with a forged sender address.

New!!: Phishing and Email spoofing · See more »


The euro (sign: €; code: EUR) is the official currency of the European Union.

New!!: Phishing and Euro · See more »

European Parliament

The European Parliament (EP) is the directly elected parliamentary institution of the European Union (EU).

New!!: Phishing and European Parliament · See more »

European Parliament Committee on Foreign Affairs

The Committee on Foreign Affairs (AFET, after the French name "Affaires étrangères"), previously called Political Affairs, is a committee of the European Parliament.

New!!: Phishing and European Parliament Committee on Foreign Affairs · See more »

Evil twin (wireless networks)

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.

New!!: Phishing and Evil twin (wireless networks) · See more »


Facebook is an American online social media and social networking service company based in Menlo Park, California.

New!!: Phishing and Facebook · See more »

Fake news

Fake news is a type of yellow journalism or propaganda that consists of deliberate misinformation or hoaxes spread via traditional print and broadcast news media or online social media.

New!!: Phishing and Fake news · See more »

Fake news website

Fake news websites (also referred to as hoax news websites) are Internet websites that deliberately publish fake news—hoaxes, propaganda, and disinformation purporting to be real news—often using social media to drive web traffic and amplify their effect.

New!!: Phishing and Fake news website · See more »

Fancy Bear

Fancy Bear (also known as APT28, Pawn Storm, Sofacy Group, Sednit and STRONTIUM) is a cyber espionage group.

New!!: Phishing and Fancy Bear · See more »

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.

New!!: Phishing and Federal Bureau of Investigation · See more »

Federal Trade Commission

The Federal Trade Commission (FTC) is an independent agency of the United States government, established in 1914 by the Federal Trade Commission Act.

New!!: Phishing and Federal Trade Commission · See more »


Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by Mozilla Foundation and its subsidiary, Mozilla Corporation.

New!!: Phishing and Firefox · See more »

Firefox 2

Mozilla Firefox 2 is a version of Firefox, a web browser released on October 24, 2006 by the Mozilla Corporation.

New!!: Phishing and Firefox 2 · See more »


Fishing is the activity of trying to catch fish.

New!!: Phishing and Fishing · See more »


Forbes is an American business magazine.

New!!: Phishing and Forbes · See more »

Fraud Act 2006

The Fraud Act 2006 (c 35) is an Act of the Parliament of the United Kingdom which affects England and Wales and Northern Ireland.

New!!: Phishing and Fraud Act 2006 · See more »

FraudWatch International

FraudWatch International is an internet security organization that was founded in 2003 that mainly specializes in online fraud protection and anti-phishing activities.

New!!: Phishing and FraudWatch International · See more »


GeoTrust is a digital certificate provider.

New!!: Phishing and GeoTrust · See more »


Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

New!!: Phishing and Google · See more »

Google Chrome

Google Chrome is a freeware web browser developed by Google LLC.

New!!: Phishing and Google Chrome · See more »

Google Docs, Sheets, and Slides

Google Docs, Google Sheets, and Google Slides are a word processor, a spreadsheet and a presentation program respectively, all part of a free, web-based software office suite offered by Google within its Google Drive service.

New!!: Phishing and Google Docs, Sheets, and Slides · See more »

Google Safe Browsing

Google Safe Browsing is a blacklist service provided by Google that provides lists of URLs for web resources that contain malware or phishing content.

New!!: Phishing and Google Safe Browsing · See more »

Government of Australia

The Government of the Commonwealth of Australia (also referred to as the Australian Government, the Commonwealth Government, or the Federal Government) is the government of the Commonwealth of Australia, a federal parliamentary constitutional monarchy.

New!!: Phishing and Government of Australia · See more »

Harvard University

Harvard University is a private Ivy League research university in Cambridge, Massachusetts.

New!!: Phishing and Harvard University · See more »


The Hewlett-Packard Company (commonly referred to as HP) or shortened to Hewlett-Packard was an American multinational information technology company headquartered in Palo Alto, California.

New!!: Phishing and Hewlett-Packard · See more »

Hillary Clinton

Hillary Diane Rodham Clinton (born October 26, 1947) is an American politician and diplomat who served as the First Lady of the United States from 1993 to 2001, U.S. Senator from New York from 2001 to 2009, 67th United States Secretary of State from 2009 to 2013, and the Democratic Party's nominee for President of the United States in the 2016 election.

New!!: Phishing and Hillary Clinton · See more »


A homophone is a word that is pronounced the same (to varying extent) as another word but differs in meaning.

New!!: Phishing and Homophone · See more »

Honeynet Project

The Honeynet Project is an international security research organization, "dedicated to investigating the latest attacks, developing open source security tools to improve Internet security and learning how hackers behave.".

New!!: Phishing and Honeynet Project · See more »

Hosts (file)

The computer file hosts is an operating system file that maps hostnames to IP addresses.

New!!: Phishing and Hosts (file) · See more »

HTML element

An HTML element is an individual component of an HTML document or web page, once this has been parsed into the Document Object Model.

New!!: Phishing and HTML element · See more »


In computing, a hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering.

New!!: Phishing and Hyperlink · See more »


The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numericalspaces of the Internet, ensuring the network's stable and secure operation.

New!!: Phishing and ICANN · See more »

ICloud leaks of celebrity photos

On August 31, 2014, a collection of almost 500 private pictures of various celebrities, mostly women, and with many containing nudity, were posted on the imageboard 4chan, and later disseminated by other users on websites and social networks such as Imgur and Reddit.

New!!: Phishing and ICloud leaks of celebrity photos · See more »

Identity theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

New!!: Phishing and Identity theft · See more »

IDN homograph attack

The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike (i.e., they are homographs, hence the term for the attack, although technically homoglyph is the more accurate term for different characters that look alike).

New!!: Phishing and IDN homograph attack · See more »

In-session phishing

In-session phishing is a form of phishing attack which relies on one web browsing session being able to detect the presence of another session (such as a visit to an online banking website) on the same web browser, and to then launch a pop-up window that pretends to have been opened from the targeted session.

New!!: Phishing and In-session phishing · See more »

Information sensitivity

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others.

New!!: Phishing and Information sensitivity · See more »

Instant messaging

Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet.

New!!: Phishing and Instant messaging · See more »

Intelligent word recognition

Intelligent Word Recognition, or IWR, is the recognition of unconstrained handwritten words.

New!!: Phishing and Intelligent word recognition · See more »

Internal Revenue Service

The Internal Revenue Service (IRS) is the revenue service of the United States federal government.

New!!: Phishing and Internal Revenue Service · See more »

International Business Times

The International Business Times is an American online news publication that publishes seven national editions and four languages.

New!!: Phishing and International Business Times · See more »

Internationalized domain name

An internationalized domain name (IDN) is an Internet domain name that contains at least one label that is displayed in software applications, in whole or in part, in a language-specific script or alphabet, such as Arabic, Chinese, Cyrillic, Tamil, Hebrew or the Latin alphabet-based characters with diacritics or ligatures, such as French.

New!!: Phishing and Internationalized domain name · See more »

Internet Explorer

Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.

New!!: Phishing and Internet Explorer · See more »

Internet Explorer 7

Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows.

New!!: Phishing and Internet Explorer 7 · See more »

Internet fraud

Internet fraud is a type of fraud which makes use of the Internet.

New!!: Phishing and Internet fraud · See more »

Internet service provider

An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.

New!!: Phishing and Internet service provider · See more »

Israeli Civil Administration

The Civil Administration (המנהל האזרחי) is the Israeli governing body that operates in the West Bank.

New!!: Phishing and Israeli Civil Administration · See more »

Java (programming language)

Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.

New!!: Phishing and Java (programming language) · See more »


JavaScript, often abbreviated as JS, is a high-level, interpreted programming language.

New!!: Phishing and JavaScript · See more »

John Doe

"John Doe", "John Roe" or "Richard Roe" (for men), "Jane Doe" or "Jane Roe" (for women), and "Baby Doe", "Janie Doe" or "Johnny Doe" (for children), or just "Doe" or "Roe" are multiple-use names that have two distinct usages.

New!!: Phishing and John Doe · See more »


Legislation (or "statutory law") is law which has been promulgated (or "enacted") by a legislature or other governing body or the process of making it.

New!!: Phishing and Legislation · See more »

List of cognitive biases

Cognitive biases are systematic patterns of deviation from norm or rationality in judgment, and are often studied in psychology and behavioral economics.

New!!: Phishing and List of cognitive biases · See more »

Look and feel

In software design, look and feel is a term used in respect of a graphical user interface and comprises aspects of its design, including elements such as colors, shapes, layout, and typefaces (the "look"), as well as the behavior of dynamic elements such as buttons, boxes, and menus (the "feel").

New!!: Phishing and Look and feel · See more »

Machine learning

Machine learning is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the ability to "learn" (i.e., progressively improve performance on a specific task) with data, without being explicitly programmed.

New!!: Phishing and Machine learning · See more »

Mail and wire fraud

In the United States, mail and wire fraud is any fraudulent scheme to intentionally deprive another of property or honest services via mail or wire communication.

New!!: Phishing and Mail and wire fraud · See more »

Malaysia Airlines Flight 17

Malaysia Airlines Flight 17 (MH17/MAS17) was a scheduled passenger flight from Amsterdam to Kuala Lumpur that was shot down on 17 July 2014 while flying over eastern Ukraine, killing all 283 passengers and 15 crew on board.

New!!: Phishing and Malaysia Airlines Flight 17 · See more »


Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Phishing and Malware · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Phishing and Man-in-the-middle attack · See more »

Metropolitan Police Service

The Metropolitan Police Service (MPS), commonly known as the Metropolitan Police and informally as the Met, is the territorial police force responsible for law enforcement in Greater London, excluding the "square mile" of the City of London, which is the responsibility of the City of London Police.

New!!: Phishing and Metropolitan Police Service · See more »


Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Phishing and Microsoft · See more »

Mobile app

A mobile app is a computer program designed to run on a mobile device such as a phone/tablet or watch.

New!!: Phishing and Mobile app · See more »


Money is any item or verifiable record that is generally accepted as payment for goods and services and repayment of debts in a particular country or socio-economic context.

New!!: Phishing and Money · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Phishing and Multi-factor authentication · See more »

Mutual authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

New!!: Phishing and Mutual authentication · See more »


Myspace (stylized as MySpace) is a social networking website offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music, and videos.

New!!: Phishing and Myspace · See more »

Nanyang Technological University

The Nanyang Technological University (Abbreviation: NTU) is an autonomous research university in Singapore.

New!!: Phishing and Nanyang Technological University · See more »


The North Atlantic Treaty Organization (NATO; Organisation du Traité de l'Atlantique Nord; OTAN), also called the North Atlantic Alliance, is an intergovernmental military alliance between 29 North American and European countries.

New!!: Phishing and NATO · See more »

Natural language processing

Natural language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data.

New!!: Phishing and Natural language processing · See more »


A neologism (from Greek νέο- néo-, "new" and λόγος lógos, "speech, utterance") is a relatively recent or isolated term, word, or phrase that may be in the process of entering common use, but that has not yet been fully accepted into mainstream language.

New!!: Phishing and Neologism · See more »


Nordea Bank AB, commonly referred to as Nordea, is a Nordic financial services group operating in Northern Europe.

New!!: Phishing and Nordea · See more »


OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.

New!!: Phishing and OAuth · See more »

Online auction

An online auction is an auction which is held over the internet.

New!!: Phishing and Online auction · See more »


OpenID is an open standard and decentralized authentication protocol.

New!!: Phishing and OpenID · See more »

Opera (web browser)

Opera is a web browser for Windows, macOS, and Linux operating systems developed by Opera Software AS.

New!!: Phishing and Opera (web browser) · See more »

Optical character recognition

Optical character recognition (also optical character reader, OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast).

New!!: Phishing and Optical character recognition · See more »

Organized crime

Organized crime is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals who intend to engage in illegal activity, most commonly for money and profit.

New!!: Phishing and Organized crime · See more »


Outbrain is an online advertiser specializing in presenting sponsored website links.

New!!: Phishing and Outbrain · See more »

Patrick Leahy

Patrick Joseph Leahy (born March 31, 1940) is an American politician serving as the senior United States Senator from Vermont, a seat he was first elected to in 1974.

New!!: Phishing and Patrick Leahy · See more »

Payment card number

A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards.

New!!: Phishing and Payment card number · See more »


PayPal Holdings, Inc. is an American company operating a worldwide online payments system that supports online money transfers and serves as an electronic alternative to traditional paper methods like cheques and money orders.

New!!: Phishing and PayPal · See more »

Penetration test

A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

New!!: Phishing and Penetration test · See more »

People's Liberation Army

The Chinese People's Liberation Army (PLA) is the armed forces of the People's Republic of China (PRC) and Communist Party of China (CPC).

New!!: Phishing and People's Liberation Army · See more »

Petya (malware)

Petya is a family of encrypting ransomware that was first discovered in 2016.

New!!: Phishing and Petya (malware) · See more »


Pharming is a cyber attack intended to redirect a website's traffic to another, fake site.

New!!: Phishing and Pharming · See more »


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Phishing and Phishing · See more »


PhishTank is an anti-phishing site.

New!!: Phishing and PhishTank · See more »


Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.

New!!: Phishing and Phreaking · See more »

Pointer (user interface)

In computing, a pointer or mouse cursor (as part of a personal computer WIMP style of interaction) is a symbol or graphical image on the computer monitor or other display device that echoes movements of the pointing device, commonly a mouse, touchpad, or stylus pen.

New!!: Phishing and Pointer (user interface) · See more »


Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

New!!: Phishing and Ransomware · See more »


RapidShare was an online file hosting service that opened in 2002.

New!!: Phishing and RapidShare · See more »

Remote access trojan

A Remote Access Toolkit (RAT) is a specific type of malware that controls a system via a remote network connection as if by physical access.

New!!: Phishing and Remote access trojan · See more »

Rock Phish

Rock Phish refers to both the phishing toolkit and the entity that publishes the toolkit.

New!!: Phishing and Rock Phish · See more »

Russian Business Network

The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale.

New!!: Phishing and Russian Business Network · See more »


Saarland (das Saarland,; la Sarre) is one of the sixteen states (Bundesländer) of the Federal Republic of Germany.

New!!: Phishing and Saarland · See more »

Safari (web browser)

Safari is a web browser developed by Apple based on the WebKit engine.

New!!: Phishing and Safari (web browser) · See more »

Sahra Wagenknecht

Sahra Wagenknecht (born 16 July 1969) is a German left-wing politician, economist, author and publicist.

New!!: Phishing and Sahra Wagenknecht · See more »

Saint Petersburg

Saint Petersburg (p) is Russia's second-largest city after Moscow, with 5 million inhabitants in 2012, part of the Saint Petersburg agglomeration with a population of 6.2 million (2015).

New!!: Phishing and Saint Petersburg · See more »


Secureworks Inc. is a United States-based subsidiary that provides information security services, protecting its customers' computers, networks and information assets from malicious activity such as cybercrime.

New!!: Phishing and SecureWorks · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Phishing and Security hacker · See more »

September 11 attacks

The September 11, 2001 attacks (also referred to as 9/11) were a series of four coordinated terrorist attacks by the Islamic terrorist group al-Qaeda against the United States on the morning of Tuesday, September 11, 2001.

New!!: Phishing and September 11 attacks · See more »


SiteKey is a web-based security system that provides one type of mutual authentication between end-users and websites.

New!!: Phishing and SiteKey · See more »

SMS phishing

In computing, SMS phishing or smishing is a form of criminal activity using social engineering techniques.

New!!: Phishing and SMS phishing · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Phishing and Social engineering (security) · See more »

Social networking service

A social networking service (also social networking site, SNS or social media) is a web application that people use to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.

New!!: Phishing and Social networking service · See more »

Social Security number

In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as.

New!!: Phishing and Social Security number · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Phishing and Spoofing attack · See more »


Tabnabbing is a computer exploit and phishing attack, which persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine.

New!!: Phishing and Tabnabbing · See more »

Target Corporation

Target Corporation is the second-largest department store retailer in the United States, behind Walmart, and is a component of the S&P 500 Index.

New!!: Phishing and Target Corporation · See more »

TD Ameritrade

TD Ameritrade is a brokerage firm based in Omaha, Nebraska with a major trading center in St Louis, Missouri.

New!!: Phishing and TD Ameritrade · See more »


Telecommunication is the transmission of signs, signals, messages, words, writings, images and sounds or information of any nature by wire, radio, optical or other electromagnetic systems.

New!!: Phishing and Telecommunication · See more »

The Banker

The Banker is an English-language monthly international financial affairs publication owned by The Financial Times Ltd.

New!!: Phishing and The Banker · See more »

The Home Depot

The Home Depot Inc. or Home Depot is an American home improvement supplies retailing company that sells tools, construction products, and services.

New!!: Phishing and The Home Depot · See more »

The Left (Germany)

The Left (Die Linke), also commonly referred to as the Left Party (die Linkspartei), is a democratic socialist political party in Germany.

New!!: Phishing and The Left (Germany) · See more »

The Mercury News

The Mercury News (formerly San Jose Mercury News, often locally known as The Merc) is a morning daily newspaper published in San Jose, California, United States.

New!!: Phishing and The Mercury News · See more »

The Pentagon

The Pentagon is the headquarters of the United States Department of Defense, located in Arlington County, Virginia, across the Potomac River from Washington, D.C. As a symbol of the U.S. military, The Pentagon is often used metonymically to refer to the U.S. Department of Defense.

New!!: Phishing and The Pentagon · See more »

The Washington Post

The Washington Post is a major American daily newspaper founded on December 6, 1877.

New!!: Phishing and The Washington Post · See more »

The Wichita Eagle

The Wichita Eagle is a daily newspaper published in Wichita, Kansas, United States.

New!!: Phishing and The Wichita Eagle · See more »


ThreatConnect is a cyber-security firm based in Arlington, Virginia.

New!!: Phishing and ThreatConnect · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Phishing and Transport Layer Security · See more »


Typosquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser.

New!!: Phishing and Typosquatting · See more »

UK Payments Administration

The UK Payments Administration Ltd (UKPA) is a United Kingdom service company that provides people, facilities and expertise to the UK payments industry.

New!!: Phishing and UK Payments Administration · See more »

United Kingdom

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain,Usage is mixed with some organisations, including the and preferring to use Britain as shorthand for Great Britain is a sovereign country in western Europe.

New!!: Phishing and United Kingdom · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Phishing and United States · See more »

United States Congress

The United States Congress is the bicameral legislature of the Federal government of the United States.

New!!: Phishing and United States Congress · See more »

United States District Court for the Western District of Washington

The United States District Court for the Western District of Washington (in case citations, W.D. Wash.) is the Federal district court whose jurisdiction comprises the following counties of the state of Washington: Clallam, Clark, Cowlitz, Grays Harbor, Island, Jefferson, King, Kitsap, Lewis, Mason, Pacific, Pierce, San Juan, Skagit, Skamania, Snohomish, Thurston, Wahkiakum, and Whatcom.

New!!: Phishing and United States District Court for the Western District of Washington · See more »

United States elections, 2016

The 2016 United States elections were held on Tuesday, November 8, 2016.

New!!: Phishing and United States elections, 2016 · See more »

United States Military Academy

The United States Military Academy (USMA), also known as West Point, Army, Army West Point, The Academy or simply The Point, is a four-year coeducational federal service academy located in West Point, New York, in Orange County.

New!!: Phishing and United States Military Academy · See more »

United States Secret Service

The United States Secret Service (also USSS or Secret Service) is a federal law enforcement agency under the U.S. Department of Homeland Security, charged with conducting criminal investigations and protecting the nation's leaders.

New!!: Phishing and United States Secret Service · See more »

United States Senate

The United States Senate is the upper chamber of the United States Congress, which along with the United States House of Representatives—the lower chamber—comprise the legislature of the United States.

New!!: Phishing and United States Senate · See more »

University of Kansas

The University of Kansas, also referred to as KU or Kansas, is a public research university in the U.S. state of Kansas.

New!!: Phishing and University of Kansas · See more »


A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

New!!: Phishing and URL · See more »

URL redirection

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address.

New!!: Phishing and URL redirection · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Phishing and User (computing) · See more »

Utica College

Utica College (or UC) is a private university in Utica, New York.

New!!: Phishing and Utica College · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Phishing and Voice over IP · See more »

Voice phishing

Voice phishing is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpose of financial reward.

New!!: Phishing and Voice phishing · See more »

WannaCry ransomware attack

The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

New!!: Phishing and WannaCry ransomware attack · See more »


Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet.

New!!: Phishing and Warez · See more »

Warez scene

The Warez scene, often referred to as The Scene, is an underground community of people that specialize in the distribution of copyrighted material, including television shows and series, movies, music, music videos, games (all platforms), applications (all platforms), ebooks, and pornography.

New!!: Phishing and Warez scene · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: Phishing and Web browser · See more »

Website spoofing

Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization.

New!!: Phishing and Website spoofing · See more »

White House

The White House is the official residence and workplace of the President of the United States.

New!!: Phishing and White House · See more »

White-collar crime

White-collar crime refers to financially motivated, nonviolent crime committed by business and government professionals.

New!!: Phishing and White-collar crime · See more »


Whitelisting is the practice of identifying entities that are provided a particular privilege, service, mobility, access or recognition.

New!!: Phishing and Whitelisting · See more »

World Anti-Doping Agency

The World Anti-Doping Agency (WADA; Agence mondiale antidopage, AMA) is a foundation initiated by the International Olympic Committee based in Canada to promote, coordinate and monitor the fight against drugs in sports.

New!!: Phishing and World Anti-Doping Agency · See more »

Young Union

The Junge Union Deutschlands (Young Union of Germany) or JU is the joint youth organisation of the two conservative German political parties, CDU and CSU.

New!!: Phishing and Young Union · See more »


1,000,000,000 (one billion, short scale; one thousand million or milliard, yard, long scale) is the natural number following 999,999,999 and preceding 1,000,000,001.

New!!: Phishing and 1,000,000,000 · See more »

Redirects here:

Anti phishing, Anti-phishing, Antiphishing, Clone phishing, Covert Redirect, Fake websites, Password phishing, Persistent Spear Phishing, Pfishing, PhISHING, Phished, Phisher, Phisherman, Phishers, Phishin, Phishing Scams, Phishing attack, Phishing scam, Phishing site, Phising, Rogue Web site, Rogue site, Scam Messages, Spear Phishing, Spear phishing, Spear-Phishing, Spear-phishing, Spearphish, Spearphishing, Website forgery, Whale Phishing.


[1] https://en.wikipedia.org/wiki/Phishing

Hey! We are on Facebook now! »