Concept:
Phishing is a type of social engineering attack where cybercriminals trick users into revealing sensitive information such as passwords, banking details, or personal data by pretending to be a legitimate organization (e.g., banks, companies, or government agencies).
Step 1: {\color{red}What is Phishing?}
Phishing typically involves:
- Fraudulent emails, messages, or websites
- Impersonation of trusted entities
- Attempts to steal credentials or financial data
Attackers exploit fear, urgency, or curiosity to manipulate victims into taking action.
Step 2: {\color{red}Fake or Suspicious Sender Address}
Users should carefully examine the sender’s email:
- Slight spelling changes (e.g., \texttt{paypa1.com} instead of \texttt{paypal.com})
- Random or unfamiliar domains
Step 3: {\color{red}Urgent or Threatening Language}
Phishing emails often create panic:
- “Your account will be suspended immediately”
- “Act now to avoid penalties”
Legitimate organizations rarely demand immediate action.
Step 4: {\color{red}Suspicious Links or URLs}
Before clicking links:
- Hover over links to preview the real URL
- Look for shortened or mismatched links
Phishing links often redirect to fake login pages.
Step 5: {\color{red}Unexpected Attachments or Requests}
Warning signs include:
- Attachments you did not request
- Requests for passwords, OTPs, or bank details
Legitimate companies never ask for sensitive data via email.
Step 6: {\color{red}Poor Grammar and Formatting}
Many phishing emails contain:
- Spelling errors
- Generic greetings (e.g., “Dear User”)
- Unprofessional design