Five Common Security Scams
- Phishing: Emails aimed at luring recipients to click on an embedded link, which could trigger a malware installation, or surrendering confidential information such as passwords or credit card numbers.
- Spear-Phishing: Attackers gather specific personal data and often impersonate friends or business associates, including mimicking their email addresses (a tactic called “spoofing”) to craft an especially realistic message.
- Vishing: Telephone-based phishing scams to gain access to confidential information.
- Smishing: Text-based phishing scams to gain access to confidential information.
- Social Engineering: Manipulation to gain access to secure areas using psychological tactics either to avoid appearing as a security risk or to convince people not to enforce security procedures.