{"id":60382,"date":"2022-12-06T09:25:38","date_gmt":"2022-12-06T01:25:38","guid":{"rendered":"https:\/\/version-2.com\/?p=60382"},"modified":"2023-02-22T14:31:39","modified_gmt":"2023-02-22T06:31:39","slug":"top-7-types-of-phishing-attacks-and-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/12\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/","title":{"rendered":"Top 7 Types of Phishing Attacks and How to Prevent Them"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"60382\" class=\"elementor elementor-60382\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" class=\"head-img\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png\" alt=\"\" ><\/p>\n\n<p>Social engineering, in the context of information security, consists of practices performed by hackers to manipulate users to take actions that go against their interests, exploiting their vulnerability and lack of knowledge for their benefit.<\/p> <p>One of the main types of social engineering is a phishing attack, which has been growing every day. According to the Verizon Data Breach Investigation 2022 report, 20% of data leaks in the surveyed period involved phishing.<\/p> <p>These numbers warn us about the need of knowing the different <b>types of phishing<\/b> and how to avoid this threat \u2013 topics covered in this article. To facilitate your understanding, we divided our text into topics. They are as follows:&nbsp;<\/p> <ul> <li><b>What Is Phishing?<\/b><\/li> <li><b>How Phishing Works<\/b><\/li> <li><b>Top 7 Types of Phishing Attacks<\/b><\/li> <li><b>Common Phishing Signs<\/b><\/li> <li><b>Best Practices for Preventing Phishing Attacks<\/b><\/li> <li><b>senhasegura GO Endpoint Manager: The Solution to Protect Against Phishing Attacks<\/b><\/li> <li><b>About senhasegura<\/b><\/li> <li><b>Conclusion<\/b><\/li> <\/ul> <p>Enjoy the reading!<\/p> <h2><b>What Is Phishing?<\/b><\/h2> <p>Phishing is a very common type of social engineering in which hackers impersonate legitimate entities or trusted people to manipulate their victims and ask them to perform certain actions, such as providing sensitive information or clicking on malicious links.<\/p> <p>Social engineering attacks such as phishing are present in almost all <a href=\"blank\">cybersecurity<\/a> incidents and often involve other threats, such as network attacks, code injection, and malware.&nbsp;<\/p> <h2><b>How Phishing Works<\/b><\/h2> <p>Typically, cybercriminals use means such as social media to gather data from their victims, such as names, roles, interests, and <a href=\"blank\">email<\/a> addresses.&nbsp;<\/p> <p>Then, this information is used to create a false message on behalf of a trusted entity, such as banks, the victim\u2019s workplace, or the victim\u2019s university.<\/p> <p>In the messages, the user is asked to download malicious attachments or click on links to malicious websites in order to collect confidential information, which may include usernames, passwords, and bank details.<\/p> <p>Some attackers use inappropriate fonts, logos, and layouts in phishing emails, making it easier to identify them as such, but cybercriminals are increasingly getting better at this, making their messages look authentic.<\/p> <h2><b>Top 7 Types of Phishing Attacks<\/b><\/h2> <p>Here are the top 7 <b>types of phishing<\/b> used by cybercriminals to manipulate their victims:<\/p> <h3><b>Deceptive Phishing<\/b><\/h3> <p>Deceptive Phishing is the most common among <b>types of phishing<\/b>. In it, attackers impersonate a legitimate entity to access their victims\u2019 personal data or login credentials, using messages with threats and a sense of urgency to manipulate them.<\/p> <p>Here are some common techniques used in Deceptive Phishing:<\/p> <ul> <li>Use of legitimate links in emails, including contact information of the organization they are impersonating;<\/li> <li>Combination of malicious and non-malicious codes to cheat Exchange Online Protection (EOP). It is possible, for example, to replicate the CSS and JavaScript of a tech company\u2019s login page to steal users\u2019 account credentials;<\/li> <li>Use of abbreviated URLs to deceive Secure Email Gateways (SEGs) and \u201ctime bombing\u201d to redirect users to a phishing landing page;<\/li> <li>Change of an HTML attribute in brand logos to prevent email filters from detecting the theft of the company\u2019s symbols;<\/li> <li>Emails with minimal content, often in image form, to avoid detection.<\/li> <\/ul> <h3><b>Spear Phishing<\/b><\/h3> <p>Spear Phishing is also among the <b>types of phishing<\/b> that use email, but this model is more targeted. In practice, hackers use open-source intelligence (OSINT) to gather publicly available company data.&nbsp;<\/p> <p>Then, they focus on specific users, using this information to make the victims believe the message is from someone within the organization, thus facilitating the accomplishment of their requests.<\/p> <p>To identify Spear Phishing, one needs to be aware of unusual insider requests, shared drive links, and documents that require a user login ID and password.<\/p> <h3><b>Whaling<\/b><\/h3> <p>Whaling is also among the <b>types of phishing<\/b> that use OSINT. Known as Whale Phishing, Whale Fraud, or CEO Fraud, this type of attack consists of identifying the name of the organization\u2019s CEO through social media or corporate website and sending a message posing as them and making requests to victims.<\/p> <p>To identify this type of attack, one must pay attention to abnormal requests made by leaders who have never sent this type of message before, for example. Moreover, it is important to verify the message has not been sent to or via a personal email.&nbsp;<\/p> <h3><b>Vishing<\/b><\/h3> <p>Vishing is voice phishing, which happens when a cybercriminal contacts their victims by phone to awaken their sense of urgency and make them respond to their requests.<\/p> <p>To identify Vishing, it is valid to check if the phone number used is from an unusual or blocked location, if the time of the call coincides with a stressful event, such as a tax filing season, and if the personal data requested is unusual.<\/p> <h3><b>Smishing<\/b><\/h3> <p>Smishing is an evolution of Vishing, which is characterized by sending texts asking the user to take a certain action to change a delivery, such as clicking on a link that installs malware on their device.<\/p> <p>One can spot it by going to the service website and checking the status of the delivery or by comparing the area code with their contact list.<\/p> <h3><b>Pharming<\/b><\/h3> <p>Pharming is among the most difficult <b>types of phishing <\/b>to identify. It consists of hijacking a Domain Name Server (DNS) and directing the user who enters the website address to a malicious domain.<\/p> <p>To protect yourself against this type of attack, you need to look for websites that are HTTPS, not HTTP, and be aware of indications that the website is false, such as strange fonts, spelling errors, or incompatible colors.<\/p> <h3><b>Angler Phishing<\/b><\/h3> <p>Angler Phishing is a type of attack in which malicious users send notifications or messages in a social media app to convince their victims to perform certain actions.<\/p> <p>In such cases, it is advisable to be careful about notifications that may have been added to a post with malicious links, direct messages from people who hardly use the app, and links to websites shared in direct messages.<\/p> <h2><b>Common Phishing Signs<\/b><\/h2> <p>Keeping an eye for signs is a way to protect yourself from the action of malicious attackers who use different<b> types of phishing<\/b> to manipulate their victims. The following are the main indications of this threat:<\/p> <h3><b>Emails Exploring a Sense of Urgency<\/b><\/h3> <p>Messages that stimulate immediate action through threats or another way of awakening a sense of urgency should be faced with suspicion. After all, in this context, the goal of hackers is to ensure their victims respond to their requests in a hurry, before they can even notice inconsistencies in the email received.<\/p> <h3><b>Inadequate Tone<\/b><\/h3> <p>An important feature of phishing is that messages can use inadequate language and tone. Therefore, if you receive a message from a friend with an overly formal tone, suspect.<\/p> <h3><b>Unusual Requests<\/b><\/h3> <p>Emails with unusual requests often consist of phishing attacks. In practice, the victim may receive a message asking them to perform an action normally performed by the IT department, for example.<\/p> <h3><b>Spelling and Grammar Mistakes<\/b><\/h3> <p>In general, organizations often set up spellchecking of their emails. Thus, it is important to pay attention to spelling and grammatical mistakes that may indicate a phishing attack.<\/p> <h3><b>Incompatible Web Addresses<\/b><\/h3> <p>Another way to detect phishing attacks is by comparing the sender\u2019s address with previous communication, which may point to incompatibility.<\/p> <p>To do this, simply hover over the link in an email before clicking on it to see its true destination.<\/p> <h3><b>Unexpected Requests<\/b><\/h3> <p>Often, cybercriminals use fake login pages associated with emails that appear to be legitimate. On these pages, they can request financial information, which should in no way be provided by users without them checking the website that allegedly sent the email.<\/p>\n\n<h2><b>Best Practices for Preventing Phishing Attacks<\/b><\/h2> <p>Here are some best practices to prevent different <b>types of phishing<\/b>:<\/p> <h3><b>Train Your Employees<\/b><\/h3> <p>Educating your employees is the first step you should take to prevent phishing attacks, after all, unprepared people are an easy target for malicious agents. Nevertheless, the training offered must go beyond the traditional approach and include recent and sophisticated threats.<\/p> <h3><b>Use Email Filters<\/b><\/h3> <p>Usually associated with spam, email filters go beyond this capability and indicate threats related to phishing attacks. In practice, using an email filter can prevent the user from receiving a large number of phishing emails.<\/p> <h3><b>Ensure Protection Against Malicious Websites<\/b><\/h3> <p>Knowing that organizations are filtering emails to prevent phishing, cybercriminals have been attacking website codes.&nbsp;<\/p> <p>So, you must install website alerts in browsers so that they point out possible risks to end users.<\/p> <h3><b>Limit Internet Access<\/b><\/h3> <p>Another way to reduce the risks associated with malicious websites is to create access control lists, which deny the connection to certain websites and applications to everyone who tries.<\/p> <h3><b>Require the Use of Multi-factor Authentication<\/b><\/h3> <p>One of the main goals of cybercriminals is to steal users\u2019 credentials, a risk that can be reduced by using multi-factor authentication (MFA).&nbsp;<\/p> <p>In practice, this mechanism requires the user to use two or more items to authenticate themselves by combining something they know (such as a password), something they have (such as a token), and something associated with who they are (such as fingerprint or facial recognition).<\/p> <h3><b>Remove Fake Websites<\/b><\/h3> <p>You can count on solutions that monitor and eliminate counterfeit versions of your website. This way, you can prevent your employees and customers from clicking on malicious links.<\/p> <h3><b>Back Up Regularly<\/b><\/h3> <p>It is very common for phishing attacks to be associated with malware, including ransomware, which can impact the productivity of your business if you do not have a data backup program.<\/p> <h2><b>senhasegura GO Endpoint Manager: The Solution to Protect Against Phishing Attacks<\/b><\/h2> <p>One of the most effective solutions to prevent different<b> types of phishing <\/b>is senhasegura GO Endpoint Manager, which allows you to protect <a href=\"blank\">computers remotely connected<\/a> to Windows and Linux endpoints.&nbsp;<\/p> <p>This tool:<\/p> <ul> <li>Allows you to control lists of authorized, notified, and blocked actions for each user, reducing threats related to the installation of malicious software and privilege abuse;<\/li> <li>Ensures compliance with regulations such as PCI, ISO, SOX, GDPR, and NIST;<\/li> <li>Enables provisioning and revocation of access for privileged local users, without having to install any agent on the target device;<\/li> <li>Records all requests for the use of administrative credentials in session logs; and<\/li> <li>Allows the segregation of access to confidential information, isolating critical environments and correlating environments.<\/li> <\/ul> <h2><b>About senhasegura<\/b><\/h2> <p><b>senhasegura<\/b> guarantees the digital sovereignty of organizations. This is because it acts by avoiding the traceability of actions and loss of information on devices, networks, servers, and databases.<\/p> <p>Our services are also useful to bring our customers into compliance with audit criteria and strict standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and <a href=\"blank\">HIPAA<\/a>.<\/p> <h2><b>Conclusion<\/b><\/h2> <p>In this article, you saw what phishing is, how this cyberattack works, what the different<b> types of phishing <\/b>are, and how to identify them. We have also shown the features of <b>senhasegura GO Endpoint Manager<\/b> and how it contributes to avoiding this threat.<b>&nbsp;&nbsp;<\/b><\/p> <p>Do you need this solution in your company? Contact us.<\/p> \n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Social engineering, in the context of information secur [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-60382","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2\" \/>\n<meta property=\"og:description\" content=\"Social engineering, in the context of information secur [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-06T01:25:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-22T06:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Top 7 Types of Phishing Attacks and How to Prevent Them\",\"datePublished\":\"2022-12-06T01:25:38+00:00\",\"dateModified\":\"2023-02-22T06:31:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/\"},\"wordCount\":1815,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/source\\\/rev-1889680\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/types-of-phishing.png\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/12\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/\",\"name\":\"Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/source\\\/rev-1889680\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/types-of-phishing.png\",\"datePublished\":\"2022-12-06T01:25:38+00:00\",\"dateModified\":\"2023-02-22T06:31:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/source\\\/rev-1889680\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/types-of-phishing.png\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/source\\\/rev-1889680\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/types-of-phishing.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 7 Types of Phishing Attacks and How to Prevent Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/","og_locale":"zh_HK","og_type":"article","og_title":"Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2","og_description":"Social engineering, in the context of information secur [&hellip;]","og_url":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/","og_site_name":"Version 2","article_published_time":"2022-12-06T01:25:38+00:00","article_modified_time":"2023-02-22T06:31:39+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"10 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/12\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Top 7 Types of Phishing Attacks and How to Prevent Them","datePublished":"2022-12-06T01:25:38+00:00","dateModified":"2023-02-22T06:31:39+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/12\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/"},"wordCount":1815,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/12\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/","url":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/","name":"Top 7 Types of Phishing Attacks and How to Prevent Them - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png","datePublished":"2022-12-06T01:25:38+00:00","dateModified":"2023-02-22T06:31:39+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/source\/rev-1889680\/wp-content\/uploads\/2022\/11\/types-of-phishing.png"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/top-7-types-of-phishing-attacks-and-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Top 7 Types of Phishing Attacks and How to Prevent Them"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fHU","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=60382"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60382\/revisions"}],"predecessor-version":[{"id":60386,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60382\/revisions\/60386"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=60382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=60382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=60382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}