We are working to restore the Unionpedia app on the Google Play Store
OutgoingIncoming
🌟We've simplified our design for better navigation!
Instagram Facebook X LinkedIn

Phishing

Index Phishing

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. [1]

Table of Contents

  1. 142 relations: Adware, Amazon (company), Anti-Phishing Working Group, AOHell, AOL, Apple Inc., Australian Government, Bank of America, Barack Obama, Bill (law), Bitcoin, Black hat (computer security), Blacklist (computing), Brazil, Bundestag, California, CAN-SPAM Act of 2003, Catfishing, Christian Democratic Union of Germany, Citibank, Clickjacking, Computer virus, Computer worm, Connecticut, Cross-site scripting, Cursor (user interface), Cyscon, Darknet market, Duke University School of Law, E-gold, EarthLink, Educational game, Elon Musk, Email, Email filtering, Email spam, Exploit kit, Fake news, Fancy Bear, Federal Bureau of Investigation, Federal Trade Commission, Firefox, Firefox 2, Forbes, Frame (World Wide Web), Fraud Act 2006, FraudWatch International, GeoTrust, Google, Google Chrome, ... Expand index (92 more) »

  2. Identity theft
  3. Types of cyberattacks

Adware

Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

See Phishing and Adware

Amazon (company)

Amazon.com, Inc., doing business as Amazon, is an American multinational technology company, engaged in e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence.

See Phishing and Amazon (company)

Anti-Phishing Working Group

The Anti-Phishing Working Group (APWG) is an international consortium that attempts to eliminate fraud and identity theft caused by phishing and related incidents It brings together businesses affected by phishing attacks: security products and service companies, law enforcement agencies, government agencies, trade associations, regional international treaty organizations, and communications companies. Phishing and Anti-Phishing Working Group are Spamming.

See Phishing and Anti-Phishing Working Group

AOHell

AOHell was a Windows application that was used to simplify 'cracking' (computer hacking) using AOL.

See Phishing and AOHell

AOL

AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City, and a brand marketed by Yahoo! Inc. The service traces its history to an online service known as PlayNET.

See Phishing and AOL

Apple Inc.

Apple Inc. is an American multinational corporation and technology company headquartered in Cupertino, California, in Silicon Valley.

See Phishing and Apple Inc.

Australian Government

The Australian Government, also known as the Commonwealth Government or the Federal Government, is the national executive government of the Commonwealth of Australia, a federal parliamentary constitutional monarchy.

See Phishing and Australian Government

Bank of America

The Bank of America Corporation (often abbreviated BofA or BoA) is an American multinational investment bank and financial services holding company headquartered at the Bank of America Corporate Center in Charlotte, North Carolina, with investment banking and auxiliary headquarters in Manhattan.

See Phishing and Bank of America

Barack Obama

Barack Hussein Obama II (born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017.

See Phishing and Barack Obama

Bill (law)

A bill is a proposal for a new law, or a proposal to significantly change an existing law.

See Phishing and Bill (law)

Bitcoin

Bitcoin (abbreviation: BTC; sign: ₿) is the first decentralized cryptocurrency.

See Phishing and Bitcoin

Black hat (computer security)

A black hat (black hat hacker or blackhat) is a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. Phishing and black hat (computer security) are cybercrime.

See Phishing and Black hat (computer security)

Blacklist (computing)

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned.

See Phishing and Blacklist (computing)

Brazil

Brazil, officially the Federative Republic of Brazil, is the largest and easternmost country in South America and Latin America.

See Phishing and Brazil

Bundestag

The Bundestag ("Federal Diet") is the German federal parliament and the lower of two federal chambers, opposed to the upper chamber, the Bundesrat.

See Phishing and Bundestag

California

California is a state in the Western United States, lying on the American Pacific Coast.

See Phishing and California

CAN-SPAM Act of 2003

The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003 is a law passed in 2003 establishing the United States' first national standards for the sending of commercial e-mail. Phishing and CAN-SPAM Act of 2003 are Spamming.

See Phishing and CAN-SPAM Act of 2003

Catfishing

Catfishing refers to the creation of a fictitious online persona, or fake identity (typically on social networking platforms), with the intent of deception, usually to mislead a victim into an online romantic relationship or to commit financial fraud. Phishing and Catfishing are deception.

See Phishing and Catfishing

Christian Democratic Union of Germany

The Christian Democratic Union of Germany (Christlich Demokratische Union Deutschlands; CDU) is a Christian democratic and conservative political party in Germany.

See Phishing and Christian Democratic Union of Germany

Citibank

Citibank, N.A. ("N. A." stands for "National Association"; stylized as citibank) is the primary U.S. banking subsidiary of financial services multinational Citigroup.

See Phishing and Citibank

Clickjacking

Clickjacking (classified as a user interface redress attack or UI redressing) is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages. Phishing and Clickjacking are social engineering (security).

See Phishing and Clickjacking

Computer virus

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. Phishing and computer virus are deception.

See Phishing and Computer virus

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

See Phishing and Computer worm

Connecticut

Connecticut is the southernmost state in the New England region of the Northeastern United States.

See Phishing and Connecticut

Cross-site scripting

Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications.

See Phishing and Cross-site scripting

Cursor (user interface)

In human–computer interaction, a cursor is an indicator used to show the current position on a computer monitor or other display device that will respond to input.

See Phishing and Cursor (user interface)

Cyscon

Cyscon is an IT consultancy with its main headquarters in Düsseldorf, Germany, founded by Thorsten Kraft and Thomas Wolf.

See Phishing and Cyscon

Darknet market

A darknet market is a commercial website on the dark web that operates via darknets such as Tor and I2P.

See Phishing and Darknet market

Duke University School of Law

Duke University School of Law is the law school of Duke University, a private research university in Durham, North Carolina.

See Phishing and Duke University School of Law

E-gold

e-gold was a digital gold currency operated by Gold & Silver Reserve Inc.

See Phishing and E-gold

EarthLink is an American Internet service provider.

See Phishing and EarthLink

Educational game

Educational games are games explicitly designed with educational purposes, or which have incidental or secondary educational value.

See Phishing and Educational game

Elon Musk

Elon Reeve Musk (born June 28, 1971) is a businessman and investor known for his key roles in space company SpaceX and automotive company Tesla, Inc. Other involvements include ownership of X Corp., the company that operates the social media platform X (formerly known as Twitter), and his role in the founding of The Boring Company, xAI, Neuralink and OpenAI.

See Phishing and Elon Musk

Email

Electronic mail (email or e-mail) is a method of transmitting and receiving messages using electronic devices. Phishing and Email are internet terminology.

See Phishing and Email

Email filtering

Email filtering is the processing of email to organize it according to specified criteria. Phishing and email filtering are Spamming.

See Phishing and Email filtering

Email spam

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). Phishing and email spam are Spamming.

See Phishing and Email spam

Exploit kit

An exploit kit is a tool used for automatically managing and deploying exploits against a target computer.

See Phishing and Exploit kit

Fake news

Fake news or information disorder is false or misleading information (misinformation, including disinformation, propaganda, and hoaxes) presented as news. Phishing and Fake news are confidence tricks, deception, fraud and social engineering (security).

See Phishing and Fake news

Fancy Bear

Fancy Bear is a Russian cyber espionage group.

See Phishing and Fancy Bear

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.

See Phishing and Federal Bureau of Investigation

Federal Trade Commission

The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) antitrust law and the promotion of consumer protection.

See Phishing and Federal Trade Commission

Firefox

Mozilla Firefox, or simply Firefox, is a free and open source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation.

See Phishing and Firefox

Firefox 2

Mozilla Firefox 2 is a version of Firefox, a web browser released on October 24, 2006 by the Mozilla Corporation.

See Phishing and Firefox 2

Forbes

Forbes is an American business magazine founded by B. C. Forbes in 1917 and owned by Hong Kong-based investment group Integrated Whale Media Investments since 2014.

See Phishing and Forbes

Frame (World Wide Web)

In the context of a web browser, a frame is a part of a web page or browser window which displays content independent of its container, with the ability to load content independently.

See Phishing and Frame (World Wide Web)

Fraud Act 2006

The Fraud Act 2006 (c 35) is an Act of the Parliament of the United Kingdom which affects England and Wales and Northern Ireland.

See Phishing and Fraud Act 2006

FraudWatch International

FraudWatch International Pty Ltd. is an internet security organization that was founded in 2003 by Trent Youl and mainly specializes in online fraud protection and anti-phishing activities. Phishing and FraudWatch International are confidence tricks, cybercrime, identity theft, organized crime activity and social engineering (security).

See Phishing and FraudWatch International

GeoTrust

GeoTrust is a digital certificate provider.

See Phishing and GeoTrust

Google

Google LLC is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial intelligence (AI).

See Phishing and Google

Google Chrome

Google Chrome is a web browser developed by Google.

See Phishing and Google Chrome

Google Safe Browsing

Google Safe Browsing is a service from Google that warns users when they attempt to navigate to a dangerous website or download dangerous files.

See Phishing and Google Safe Browsing

Hillary Clinton

Hillary Diane Rodham Clinton (Rodham; born October 26, 1947) is an American politician and diplomat who served as the 67th United States secretary of state in the administration of Barack Obama from 2009 to 2013, as a U.S. senator representing New York from 2001 to 2009, and as the first lady of the United States to former president Bill Clinton from 1993 to 2001.

See Phishing and Hillary Clinton

Hillary Clinton 2016 presidential campaign

The 2016 presidential campaign of Hillary Clinton was announced in a YouTube video on April 12, 2015.

See Phishing and Hillary Clinton 2016 presidential campaign

Hosts (file)

The computer file hosts is an operating system file that maps hostnames to IP addresses.

See Phishing and Hosts (file)

In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping.

See Phishing and Hyperlink

ICANN

The Internet Corporation for Assigned Names and Numbers (ICANN) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the Internet's stable and secure operation.

See Phishing and ICANN

Identity theft

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Phishing and identity theft are fraud and organized crime activity.

See Phishing and Identity theft

IDN homograph attack

The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike (i.e., they are homographs, hence the term for the attack, although technically homoglyph is the more accurate term for different characters that look alike). Phishing and IDN homograph attack are deception.

See Phishing and IDN homograph attack

Information security

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks.

See Phishing and Information security

Information sensitivity

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others.

See Phishing and Information sensitivity

Instant messaging

Instant messaging (IM) technology is a type of online chat allowing immediate transmission of messages over the Internet or another computer network.

See Phishing and Instant messaging

Internal Revenue Service

The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory tax law.

See Phishing and Internal Revenue Service

International Business Times

The International Business Times is an American online newspaper that publishes five national editions in four languages.

See Phishing and International Business Times

Internationalized domain name

An internationalized domain name (IDN) is an Internet domain name that contains at least one label displayed in software applications, in whole or in part, in non-Latin script or alphabet or in the Latin alphabet-based characters with diacritics or ligatures.

See Phishing and Internationalized domain name

Internet Crime Complaint Center

The Internet Crime Complaint Center (IC3) is a division of the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity.

See Phishing and Internet Crime Complaint Center

Internet Explorer

Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a retired series of graphical web browsers developed by Microsoft that were used in the Windows line of operating systems.

See Phishing and Internet Explorer

Internet Explorer 7

Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows.

See Phishing and Internet Explorer 7

Joe Biden

Joseph Robinette Biden Jr. (born November 20, 1942) is an American politician who is the 46th and current president of the United States since 2021.

See Phishing and Joe Biden

John Doe

John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used in the United States when the true name of a person is unknown or is being intentionally concealed.

See Phishing and John Doe

On the World Wide Web, a link farm is any group of websites that all hyperlink to other sites in the group for the purpose of increasing SEO rankings. Phishing and link farm are Spamming.

See Phishing and Link farm

A logo (abbreviation of logotype) is a graphic mark, emblem, or symbol used to aid and promote public identification and recognition.

See Phishing and Logo

Machine learning

Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of statistical algorithms that can learn from data and generalize to unseen data and thus perform tasks without explicit instructions.

See Phishing and Machine learning

Mail and wire fraud

Mail fraud and wire fraud are terms used in the United States to describe the use of a physical (e.g., the U.S. Postal Service) or electronic (e.g., a phone, a telegram, a fax, or the Internet) mail system to defraud another, and are U.S. federal crimes. Phishing and mail and wire fraud are fraud and organized crime activity.

See Phishing and Mail and wire fraud

Malware

Malware (a portmanteau of malicious software)Tahir, R. (2018). Phishing and Malware are cybercrime.

See Phishing and Malware

Microsoft

Microsoft Corporation is an American multinational corporation and technology company headquartered in Redmond, Washington.

See Phishing and Microsoft

Mousetrapping

Mousetrapping is a technique that prevents users from exiting a website through standard means. Phishing and Mousetrapping are internet terminology.

See Phishing and Mousetrapping

MPack (software)

In computer security, MPack is a PHP-based malware kit produced by Russian crackers. Phishing and MPack (software) are cybercrime.

See Phishing and MPack (software)

Multi-factor authentication

Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.

See Phishing and Multi-factor authentication

Mutual authentication

Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol.

See Phishing and Mutual authentication

Natural language processing

Natural language processing (NLP) is an interdisciplinary subfield of computer science and artificial intelligence.

See Phishing and Natural language processing

Nordea

Nordea Bank Abp, commonly referred to as Nordea, is a Nordic financial services group operating in northern Europe with headquarters in Helsinki, Finland.

See Phishing and Nordea

Opera (web browser)

Opera is a multi-platform web browser developed by its namesake company Opera.

See Phishing and Opera (web browser)

Operating system

An operating system (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs.

See Phishing and Operating system

Optical character recognition

Optical character recognition or optical character reader (OCR) is the electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example: from a television broadcast).

See Phishing and Optical character recognition

Organized crime

Organized crime is a category of transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit.

See Phishing and Organized crime

Parking violation

A parking violation is the act of parking a motor vehicle in a restricted place or in an unauthorized manner.

See Phishing and Parking violation

Password

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity.

See Phishing and Password

Patrick Leahy

Patrick Joseph Leahy, (born March 31, 1940) is an American politician and attorney who represented Vermont in the United States Senate from 1975 to 2023.

See Phishing and Patrick Leahy

PayPal

PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers; it serves as an electronic alternative to traditional paper methods such as checks and money orders.

See Phishing and PayPal

Personal data

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

See Phishing and Personal data

PhishTank

PhishTank is an anti-phishing site. Phishing and PhishTank are cybercrime.

See Phishing and PhishTank

Privacy

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

See Phishing and Privacy

QR code

A QR code (quick-response code) is a type of two-dimensional matrix barcode, invented in 1994, by Japanese company Denso Wave for labelling automobile parts.

See Phishing and QR code

Ransomware

Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a "ransom" is paid.

See Phishing and Ransomware

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission.

See Phishing and RSA (cryptosystem)

Saarland

Saarland (Sarre) is a state of Germany in the southwest of the country.

See Phishing and Saarland

Safari (web browser)

Safari is a web browser developed by Apple.

See Phishing and Safari (web browser)

Sahra Wagenknecht

Sahra Wagenknecht (born Sarah Wagenknecht;; 16 July 1969) is a German politician, economist, author, and publicist.

See Phishing and Sahra Wagenknecht

Scam

A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Phishing and scam are confidence tricks, fraud and organized crime activity.

See Phishing and Scam

Security hacker

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Phishing and security hacker are identity theft.

See Phishing and Security hacker

September 11 attacks

The September 11 attacks, commonly known as 9/11, were four coordinated Islamist terrorist suicide attacks carried out by al-Qaeda against the United States in 2001.

See Phishing and September 11 attacks

Shuman Ghosemajumder

Shuman Ghosemajumder (born 1974) is a Canadian technologist, entrepreneur, and author.

See Phishing and Shuman Ghosemajumder

Simulated phishing

Simulated phishing or a phishing test is where deceptive emails, similar to malicious emails, are sent by an organization to their own staff to gauge their response to phishing and similar email attacks. Phishing and Simulated phishing are cybercrime, identity theft and social engineering (security).

See Phishing and Simulated phishing

SiteKey

SiteKey is a web-based security system that provides one type of mutual authentication between end-users and websites.

See Phishing and SiteKey

Smart card

A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource.

See Phishing and Smart card

Smartphone

A smartphone, often simply called a phone, is a mobile device that combines the functionality of a traditional mobile phone with advanced computing capabilities.

See Phishing and Smartphone

SMS

Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems.

See Phishing and SMS

Social engineering (security)

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Phishing and social engineering (security) are confidence tricks, cybercrime and deception.

See Phishing and Social engineering (security)

Social networking service

A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, activities, backgrounds or real-life connections.

See Phishing and Social networking service

Speech synthesis

Speech synthesis is the artificial production of human speech.

See Phishing and Speech synthesis

Subdomain

In the Domain Name System (DNS) hierarchy, a subdomain is a domain that is a part of another (main) domain.

See Phishing and Subdomain

Target Corporation

Target Corporation is an American retail corporation that operates a chain of discount department stores and hypermarkets, headquartered in Minneapolis, Minnesota.

See Phishing and Target Corporation

The Left (Germany)

The Left (Die Linke), commonly referred to as the Left Party (Die Linkspartei), is a democratic socialist political party in Germany.

See Phishing and The Left (Germany)

The Mercury News

The Mercury News (formerly San Jose Mercury News, often locally known as The Merc) is a morning daily newspaper published in San Jose, California, in the San Francisco Bay Area.

See Phishing and The Mercury News

The Pentagon

The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II.

See Phishing and The Pentagon

The Washington Post

The Washington Post, locally known as "the Post" and, informally, WaPo or WP, is an American daily newspaper published in Washington, D.C., the national capital.

See Phishing and The Washington Post

The Web Conference

The ACM Web Conference (formerly known as International World Wide Web Conference, abbreviated as WWW) is a yearly international academic conference on the topic of the future direction of the World Wide Web.

See Phishing and The Web Conference

Transport Layer Security

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.

See Phishing and Transport Layer Security

Trojan horse (computing)

In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. Phishing and Trojan horse (computing) are social engineering (security).

See Phishing and Trojan horse (computing)

TrustRank

TrustRank is an algorithm that conducts link analysis to separate useful webpages from spam and helps search engine rank pages in SERPs (Search Engine Results Pages).

See Phishing and TrustRank

Twitter

X, commonly referred to by its former name Twitter, is a social networking service.

See Phishing and Twitter

Typosquatting

Typosquatting, also called URL hijacking, a sting site, a cousin domain, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Phishing and Typosquatting are cybercrime.

See Phishing and Typosquatting

United Kingdom

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of the continental mainland.

See Phishing and United Kingdom

United States

The United States of America (USA or U.S.A.), commonly known as the United States (US or U.S.) or America, is a country primarily located in North America.

See Phishing and United States

United States Congress

The United States Congress, or simply Congress, is the legislature of the federal government of the United States.

See Phishing and United States Congress

United States District Court for the Western District of Washington

The United States District Court for the Western District of Washington (in case citations, W.D. Wash.) is the federal district court whose jurisdiction comprises the following counties of the state of Washington: Clallam, Clark, Cowlitz, Grays Harbor, Island, Jefferson, King, Kitsap, Lewis, Mason, Pacific, Pierce, San Juan, Skagit, Skamania, Snohomish, Thurston, Wahkiakum, and Whatcom.

See Phishing and United States District Court for the Western District of Washington

United States Secret Service

The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security with the purpose of conducting investigations into currency and financial-payment crime, and protecting U.S. political leaders, their families, and visiting heads of state or government.

See Phishing and United States Secret Service

URL

A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it.

See Phishing and URL

URL redirection

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. Phishing and URL redirection are internet terminology and Spamming.

See Phishing and URL redirection

Utica University

Utica University is a private university in Utica, New York.

See Phishing and Utica University

Virus hoax

A computer virus hoax is a message warning the recipients of a non-existent computer virus threat.

See Phishing and Virus hoax

Voice over IP

Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication sessions over Internet Protocol (IP) networks, such as the Internet.

See Phishing and Voice over IP

Warez

Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet.

See Phishing and Warez

Warez scene

The Warez scene, often referred to as The Scene, is a worldwide, underground, organized network of pirate groups specializing in obtaining and illegally releasing digital media for free before their official sale date.

See Phishing and Warez scene

Watering hole attack

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.

See Phishing and Watering hole attack

WebAuthn

Web Authentication (WebAuthn) is a web standard published by the World Wide Web Consortium (W3C).

See Phishing and WebAuthn

Whitelist

A whitelist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Phishing and whitelist are Spamming.

See Phishing and Whitelist

Witness summons

A subpoena (also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure.

See Phishing and Witness summons

World Anti-Doping Agency

The World Anti-Doping Agency (WADA; Agence mondiale antidopage, AMA) is a foundation initiated by the International Olympic Committee based in Canada to promote, coordinate, and monitor the fight against drugs in sports.

See Phishing and World Anti-Doping Agency

Young Union

The Junge Union Deutschlands (English: Young Union of Germany) or JU is the joint youth organisation of the CDU/CSU coalition in Germany.

See Phishing and Young Union

2016–2021 literary phishing thefts

Between 2016 and 2021, multiple prepublication manuscripts were stolen via a phishing scheme that investigators believed were conducted by an industry insider or insiders. Phishing and 2016–2021 literary phishing thefts are fraud.

See Phishing and 2016–2021 literary phishing thefts

2600: The Hacker Quarterly

2600: The Hacker Quarterly is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground." With origins in the phone phreaking community and late 20th-century counterculture, 2600 and its associated conference transitioned to coverage of modern hacker culture, and the magazine has become a platform for speaking out against increased digital surveillance and advocacy of personal and digital freedoms.

See Phishing and 2600: The Hacker Quarterly

See also

Identity theft

Types of cyberattacks

References

[1] https://en.wikipedia.org/wiki/Phishing

Also known as 302 Google Jacking, Anti phishing, Anti-phishing, Antiphishing, Clone phishing, Covert Redirect, Fake login pages, Fake password reset email, Fake websites, Page hijacking, Pagejacking, Password phishing, Persistent Spear Phishing, Pfishing, Phished, Phisher, Phisherman, Phishers, Phishin, Phishing Scams, Phishing attack, Phishing countermeasures, Phishing detection, Phishing scam, Phishing site, Phising, Quishing, Rogue Web site, Rogue site, SMS phishing, SMiShing, Scam Messages, Smshing, Spear Phishing, Spear-Phishing, Spearphish, Spearphishing, Web page hijacking, Webpage hijacking, Website forgery, Whale Phishing.

, Google Safe Browsing, Hillary Clinton, Hillary Clinton 2016 presidential campaign, Hosts (file), Hyperlink, ICANN, Identity theft, IDN homograph attack, Information security, Information sensitivity, Instant messaging, Internal Revenue Service, International Business Times, Internationalized domain name, Internet Crime Complaint Center, Internet Explorer, Internet Explorer 7, Joe Biden, John Doe, Link farm, Logo, Machine learning, Mail and wire fraud, Malware, Microsoft, Mousetrapping, MPack (software), Multi-factor authentication, Mutual authentication, Natural language processing, Nordea, Opera (web browser), Operating system, Optical character recognition, Organized crime, Parking violation, Password, Patrick Leahy, PayPal, Personal data, PhishTank, Privacy, QR code, Ransomware, RSA (cryptosystem), Saarland, Safari (web browser), Sahra Wagenknecht, Scam, Security hacker, September 11 attacks, Shuman Ghosemajumder, Simulated phishing, SiteKey, Smart card, Smartphone, SMS, Social engineering (security), Social networking service, Speech synthesis, Subdomain, Target Corporation, The Left (Germany), The Mercury News, The Pentagon, The Washington Post, The Web Conference, Transport Layer Security, Trojan horse (computing), TrustRank, Twitter, Typosquatting, United Kingdom, United States, United States Congress, United States District Court for the Western District of Washington, United States Secret Service, URL, URL redirection, Utica University, Virus hoax, Voice over IP, Warez, Warez scene, Watering hole attack, WebAuthn, Whitelist, Witness summons, World Anti-Doping Agency, Young Union, 2016–2021 literary phishing thefts, 2600: The Hacker Quarterly.