{"id":2798,"date":"2023-12-30T15:59:00","date_gmt":"2023-12-30T15:59:00","guid":{"rendered":"https:\/\/porkbun.com\/blog\/?p=2798"},"modified":"2024-01-18T16:58:28","modified_gmt":"2024-01-18T16:58:28","slug":"what-is-phishing","status":"publish","type":"post","link":"https:\/\/porkbun.com\/blog\/what-is-phishing\/","title":{"rendered":"What Is Phishing? Protect Yourself From These Cyber Attacks"},"content":{"rendered":"\n<p>Protecting your personal data should be a top priority for everyone using the internet. With so much personal information being shared for purchases, registrations, and more, it\u2019s critical that you know who you\u2019re providing your info to and how they\u2019ll use it.<\/p>\n\n\n\n<p>While reputable websites may require personal information to process payments or other types of transactions, there are an unfortunate number of cyber criminals getting exceptionally creative in their attempts to steal your information for their personal gain. One of the most common methods is called phishing.<\/p>\n\n\n\n<p>What is phishing, and how can you protect yourself? Keep reading as we squeal on these bad actors and teach you some of their techniques to look out for!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Phishing?<\/h2>\n\n\n\n<p><em>What a weird word! What does phishing mean?<\/em><\/p>\n\n\n\n<p>Phishing is a type of cyber attack in which attackers use deceptive emails, text messages, or even websites to trick you into providing sensitive information such as your username, passwords, credit card details, or other personal information. The term &#8220;phishing&#8221; is a play on the word &#8220;fishing,&#8221; as attackers are essentially casting out bait in the hope of catching unsuspecting victims.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\">2022 report from the FBI Internet Crime Complaint Center<\/a> labeled phishing as the most common type of cybercrime around the world. Per their report, phishing crimes have included more than 300,000 victims with more than $52 million stolen.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Phishing Works<\/h2>\n\n\n\n<p>Phishing relies on two main psychological principles: urgency and familiarity. Actions like sending you warnings regarding suspicious activity on sensitive accounts create a sense of panic and cause you to want to take immediate action.&nbsp;<\/p>\n\n\n\n<p>These scammers then present \u201csolutions\u201d designed to look legit, while actually stealing your information. Some of the methods to look for include:<\/p>\n\n\n\n<ul>\n<li><strong>Emails or messages:<\/strong> Phishing attacks often begin with you receiving an email or message that appears to be from a legitimate source, such as your bank, a government agency, or popular online service they\u2019re betting you use.<\/li>\n\n\n\n<li><strong>Deceptive content:<\/strong> The content of the message usually contains urgent or alarming language, prompting you to take immediate action and providing a link to do so. It may claim that there&#8217;s a security issue, a problem with your account, or a need to verify your personal information.<\/li>\n\n\n\n<li><strong>Fake websites:<\/strong> The email or message typically includes a link that directs the victim to a fraudulent website that closely mimics a legitimate one. This site is designed to capture sensitive information when you enter it (login info, credit card info, etc.).<\/li>\n\n\n\n<li><strong>Information collection: <\/strong>Attackers collect and use your information for numerous malicious purposes ranging from identity theft and financial fraud to blocking your access until you pay a ransom.<\/li>\n<\/ul>\n\n\n\n<p>Phishing attacks can also involve other communication channels like instant messaging or social media.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Types of Phishing Attacks<\/h2>\n\n\n\n<p>Phishing attacks come in various forms, each employing different tactics to deceive you or your business. Unfortunately, these methods have become more sophisticated over the years, sometimes making it difficult to tell a phishing scheme right away.<\/p>\n\n\n\n<p>Because of this, it\u2019s crucial you stay constantly vigilant about any communication asking for sensitive information, suggesting account issues, or even odd messages seeming to be from people you know.<\/p>\n\n\n\n<p>Here are some common types of phishing attacks to be on the look for:<\/p>\n\n\n\n<ul>\n<li><strong>Email phishing: <\/strong>Attackers send mass emails pretending to be from a reputable source, urging you to click on links or provide sensitive information.<\/li>\n\n\n\n<li><strong>Spear phishing:<\/strong> A more targeted approach where attackers customize their emails specifically for you or your organization, often using information gathered through social engineering.<\/li>\n\n\n\n<li><strong>Smishing (SMS phishing):<\/strong> Attackers send phishing messages via SMS (text messages) to trick you into clicking on malicious links or providing sensitive information.<\/li>\n\n\n\n<li><strong>Vishing (voice phishing):<\/strong> Phishers use phone calls to impersonate legitimate entities like your bank or government agencies to get you to give them sensitive information.<\/li>\n\n\n\n<li><strong>Pharming:<\/strong> Attackers redirect website traffic to fraudulent sites without your knowledge. In these circumstances, you may think you\u2019re on a legitimate site when you\u2019re actually providing sensitive information to the attackers. This is done by manipulating the <a href=\"https:\/\/kb.porkbun.com\/article\/187-what-is-dns\">Domain Name System (DNS) servers<\/a> or sneaking malware onto your computer..<\/li>\n\n\n\n<li><strong>Clone phishing:<\/strong> Phishers may create a replica (clone) of a legitimate email, altering the content slightly to include malicious links or attachments. The email appears to come from a trusted source.<\/li>\n\n\n\n<li><strong>Whaling (CEO fraud):<\/strong> These types of phishing attacks target high-profile individuals or executives within an organization. Attackers aim to trick them into authorizing financial transactions or revealing sensitive company information.<\/li>\n<\/ul>\n\n\n\n<p>Phishing attacks aren\u2019t just a headache, they can lead to major security risks for you, your business, and related organizations. To protect against phishing, you need to be cautious about clicking on links or providing personal information in response to unsolicited messages. Verify the legitimacy of emails and websites, use two-factor authentication, and stay informed about the most common phishing techniques circulating at any given time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your personal data should be a top priority for everyone using the internet. With so much personal information being shared for purchases, registrations, and more, it\u2019s critical that you know who you\u2019re providing your info to and how they\u2019ll use it. While reputable websites may require personal information to process payments or other types [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[342,341],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com\" \/>\n<meta property=\"og:description\" content=\"Protecting your personal data should be a top priority for everyone using the internet. With so much personal information being shared for purchases, registrations, and more, it\u2019s critical that you know who you\u2019re providing your info to and how they\u2019ll use it. While reputable websites may require personal information to process payments or other types [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Porkbun.com\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-30T15:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T16:58:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Porkbun\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Porkbun\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\"},\"author\":{\"name\":\"Porkbun\",\"@id\":\"https:\/\/porkbun.com\/blog\/#\/schema\/person\/2a4a61abc3784179933d16d523540fbb\"},\"headline\":\"What Is Phishing? Protect Yourself From These Cyber Attacks\",\"datePublished\":\"2023-12-30T15:59:00+00:00\",\"dateModified\":\"2024-01-18T16:58:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\/\/porkbun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg\",\"keywords\":[\"Cyber Security\",\"Phishing\"],\"articleSection\":[\"blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\",\"url\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\",\"name\":\"What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com\",\"isPartOf\":{\"@id\":\"https:\/\/porkbun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg\",\"datePublished\":\"2023-12-30T15:59:00+00:00\",\"dateModified\":\"2024-01-18T16:58:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/porkbun.com\/blog\/what-is-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage\",\"url\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg\",\"contentUrl\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg\",\"width\":1280,\"height\":853,\"caption\":\"what-is-phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/porkbun.com\/blog\/what-is-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/porkbun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Phishing? Protect Yourself From These Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/porkbun.com\/blog\/#website\",\"url\":\"https:\/\/porkbun.com\/blog\/\",\"name\":\"Porkbun.com\",\"description\":\"The Porkbun Blog\",\"publisher\":{\"@id\":\"https:\/\/porkbun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/porkbun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/porkbun.com\/blog\/#organization\",\"name\":\"Porkbun.com\",\"url\":\"https:\/\/porkbun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/porkbun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2019\/02\/porkbun-logo.png\",\"contentUrl\":\"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2019\/02\/porkbun-logo.png\",\"width\":404,\"height\":404,\"caption\":\"Porkbun.com\"},\"image\":{\"@id\":\"https:\/\/porkbun.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/porkbun.com\/blog\/#\/schema\/person\/2a4a61abc3784179933d16d523540fbb\",\"name\":\"Porkbun\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/porkbun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/acbb20a6a244d87026e5f17010f585ee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/acbb20a6a244d87026e5f17010f585ee?s=96&d=mm&r=g\",\"caption\":\"Porkbun\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/porkbun.com\/blog\/what-is-phishing\/","og_locale":"en_US","og_type":"article","og_title":"What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com","og_description":"Protecting your personal data should be a top priority for everyone using the internet. With so much personal information being shared for purchases, registrations, and more, it\u2019s critical that you know who you\u2019re providing your info to and how they\u2019ll use it. While reputable websites may require personal information to process payments or other types [&hellip;]","og_url":"https:\/\/porkbun.com\/blog\/what-is-phishing\/","og_site_name":"Porkbun.com","article_published_time":"2023-12-30T15:59:00+00:00","article_modified_time":"2024-01-18T16:58:28+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg","type":"image\/jpeg"}],"author":"Porkbun","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Porkbun","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#article","isPartOf":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/"},"author":{"name":"Porkbun","@id":"https:\/\/porkbun.com\/blog\/#\/schema\/person\/2a4a61abc3784179933d16d523540fbb"},"headline":"What Is Phishing? Protect Yourself From These Cyber Attacks","datePublished":"2023-12-30T15:59:00+00:00","dateModified":"2024-01-18T16:58:28+00:00","mainEntityOfPage":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/"},"wordCount":828,"publisher":{"@id":"https:\/\/porkbun.com\/blog\/#organization"},"image":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg","keywords":["Cyber Security","Phishing"],"articleSection":["blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/","url":"https:\/\/porkbun.com\/blog\/what-is-phishing\/","name":"What Is Phishing? Protect Yourself From These Cyber Attacks - Porkbun.com","isPartOf":{"@id":"https:\/\/porkbun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage"},"image":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg","datePublished":"2023-12-30T15:59:00+00:00","dateModified":"2024-01-18T16:58:28+00:00","breadcrumb":{"@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/porkbun.com\/blog\/what-is-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#primaryimage","url":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg","contentUrl":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2024\/01\/what-is-phishing.jpeg","width":1280,"height":853,"caption":"what-is-phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/porkbun.com\/blog\/what-is-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/porkbun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Phishing? Protect Yourself From These Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/porkbun.com\/blog\/#website","url":"https:\/\/porkbun.com\/blog\/","name":"Porkbun.com","description":"The Porkbun Blog","publisher":{"@id":"https:\/\/porkbun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/porkbun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/porkbun.com\/blog\/#organization","name":"Porkbun.com","url":"https:\/\/porkbun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/porkbun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2019\/02\/porkbun-logo.png","contentUrl":"https:\/\/porkbun.com\/blog\/wp-content\/uploads\/2019\/02\/porkbun-logo.png","width":404,"height":404,"caption":"Porkbun.com"},"image":{"@id":"https:\/\/porkbun.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/porkbun.com\/blog\/#\/schema\/person\/2a4a61abc3784179933d16d523540fbb","name":"Porkbun","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/porkbun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/acbb20a6a244d87026e5f17010f585ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acbb20a6a244d87026e5f17010f585ee?s=96&d=mm&r=g","caption":"Porkbun"}}]}},"_links":{"self":[{"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/posts\/2798"}],"collection":[{"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/comments?post=2798"}],"version-history":[{"count":1,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/posts\/2798\/revisions"}],"predecessor-version":[{"id":2800,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/posts\/2798\/revisions\/2800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/media\/2799"}],"wp:attachment":[{"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/media?parent=2798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/categories?post=2798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/porkbun.com\/blog\/wp-json\/wp\/v2\/tags?post=2798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}