{"id":6287,"date":"2024-01-08T16:59:54","date_gmt":"2024-01-08T15:59:54","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?p=6287"},"modified":"2024-04-10T16:48:47","modified_gmt":"2024-04-10T14:48:47","slug":"phishing-what-is-it-and-how-many-types-are-there","status":"publish","type":"post","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/","title":{"rendered":"Phishing: What Is It and How Many Types Are There"},"content":{"rendered":"<h1 style=\"text-align: center;\">Phishing: What Is It and How Many Types Are There<\/h1>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In this article, we are going to continue talking about one of the most common types of cyberattack:<\/span> <i><span style=\"font-weight: 400;\"><\/span><span style=\"font-weight: 400;\">phishing.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Phishing<\/strong> is a set of techniques that aim to deceive a victim and gain their confidence by impersonating a trusted person, company or service (impersonation of a trusted third party), to manipulate them and make them perform actions they should not perform (revealing confidential information or clicking on a link). El suplantador se llama <\/span><i><span style=\"font-weight: 400;\">a phisher<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Types of phishing<\/b><\/h2>\n<p><strong>Email phishing<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Most of these phishing messages are sent via spam. They are not personalized or targeted at a specific person or company. Their content varies depending on the phisher\u2019s target. Common phishing targets include banks and financial services, email and cloud productivity providers, and streaming services.<\/span><\/p>\n<p><strong>Voice phishing<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Voice phishing is the use of the telephone to carry out attacks. Attackers use VoIP (Voice over IP) technology to make numerous fraudulent calls cheaply or free of charge to obtain codes, passwords or bank details from the victim, who is often unsuspecting.<\/span><\/p>\n<p><strong>SMS Phishing<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">SMS phishing Smishing is a form of phishing in which mobile phones are used as the attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via an SMS message. The criminal carries out the attack with an attempt to obtain personal information, including credit card or social security numbers.<\/span><\/p>\n<p><strong>Page hijacking<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">It is achieved by creating an illegitimate copy of a popular website, but when visitors log on, they are redirected to another website.<\/span><\/p>\n<p><strong>Calendar phishing<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Calendar phishing is when phishing links are delivered via calendar invitations. Calendar invitations that are sent are, by default, automatically added to many calendars.<\/span><\/p>\n<p>The proliferation of phishing makes it an obligation for organizations to <strong>protect themselves<\/strong> with awareness, education, and evaluation strategies for employees and internal cybersecurity tools, but also the <strong>protection of their clients<\/strong> with proactive strategies for detecting phishing and corporate identity impersonation on social networks and public forums.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is a set of techniques that aim to deceive a victim and gain their confidence by impersonating a trusted person, company or service.<\/p>\n","protected":false},"author":4,"featured_media":6310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[58,50],"tags":[59,53],"class_list":["post-6287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-risks","tag-cybersecurity","tag-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing: What Is It and How Many Types Are There - Enthec<\/title>\n<meta name=\"description\" content=\"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: What Is It and How Many Types Are There - Enthec\" \/>\n<meta property=\"og:description\" content=\"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T15:59:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T14:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"amorena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"amorena\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"},\"author\":{\"name\":\"amorena\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\"},\"headline\":\"Phishing: What Is It and How Many Types Are There\",\"datePublished\":\"2024-01-08T15:59:54+00:00\",\"dateModified\":\"2024-04-10T14:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"},\"wordCount\":359,\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Risks\"],\"articleSection\":[\"Cybersecurity\",\"Risks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\",\"name\":\"Phishing: What Is It and How Many Types Are There - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"datePublished\":\"2024-01-08T15:59:54+00:00\",\"dateModified\":\"2024-04-10T14:48:47+00:00\",\"description\":\"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"width\":2048,\"height\":1152,\"caption\":\"Licensed programmer running code on laptop, troubleshooting and updating data center equipment designed to accommodate server clusters, networking systems and storage arrays, close up\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing: What Is It and How Many Types Are There\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\",\"name\":\"amorena\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/amorena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: What Is It and How Many Types Are There - Enthec","description":"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Phishing: What Is It and How Many Types Are There - Enthec","og_description":"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/","og_site_name":"Enthec","article_published_time":"2024-01-08T15:59:54+00:00","article_modified_time":"2024-04-10T14:48:47+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","type":"image\/jpeg"}],"author":"amorena","twitter_card":"summary_large_image","twitter_misc":{"Written by":"amorena","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#article","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/"},"author":{"name":"amorena","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661"},"headline":"Phishing: What Is It and How Many Types Are There","datePublished":"2024-01-08T15:59:54+00:00","dateModified":"2024-04-10T14:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/"},"wordCount":359,"publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","keywords":["Cybersecurity","Risks"],"articleSection":["Cybersecurity","Risks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/","name":"Phishing: What Is It and How Many Types Are There - Enthec","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","datePublished":"2024-01-08T15:59:54+00:00","dateModified":"2024-04-10T14:48:47+00:00","description":"One of the most common types of cyberattack is phishing, which aims to deceive a victim by impersonating a trusted person.","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","width":2048,"height":1152,"caption":"Licensed programmer running code on laptop, troubleshooting and updating data center equipment designed to accommodate server clusters, networking systems and storage arrays, close up"},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/phishing-what-is-it-and-how-many-types-are-there\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/"},{"@type":"ListItem","position":2,"name":"Phishing: What Is It and How Many Types Are There"}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661","name":"amorena","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/amorena\/"}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/comments?post=6287"}],"version-history":[{"count":2,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6287\/revisions"}],"predecessor-version":[{"id":7015,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/6287\/revisions\/7015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media\/6310"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media?parent=6287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/categories?post=6287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/tags?post=6287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}