Common Phishing Techniques to Look Out For

Common Phishing Techniques to Look Out For
Photo Submitted

Phishing attacks can come in many different forms and sizes, including emails, phone calls, text messages or mail. The six most common types of phishing are spear phishing, smishing, clone phishing, angler phishing, bulk phishing and vishing.  

  • Spear Phishing: A targeted form of phishing, where attackers personalize their emails or messages to a specific individual or organization. 

  • Smishing: Text messages sent to trick individuals into clicking malicious links or revealing sensitive information. 

  • Clone Phishing: Attackers create a nearly identical copy of a legitimate email but replace attachments or links with malicious ones to trick the recipient. 

  • Angler Phishing: Fraudulent social media posts or direct messages used to impersonate legitimate companies, tricking users into sharing sensitive information or clicking malicious links. 

  • Bulk Phishing: A widespread phishing attack where scammers send fraudulent emails to many recipients with vague, non-personal information.    

  • Vishing: Attackers use phone calls or voicemail to impersonate legitimate entities, convincing victims to share personal information or authorize transactions. 

Approaching all messages with caution provides the opportunity to identify if it is legitimate or not. Taking one small step to verify if a message is legitimate can save you from becoming the victim of a cyber attack. All phishing emails should be reported using the Report Message button in Outlook.  

Contacts

Ele Powell, digital content strategist
Division of Finance and Administration
479-718-1918, elep@uark.edu

News Daily