Wednesday, July 6

Phishing: what are the most popular attacks and how to prevent them | Digital Trends Spanish

It is estimated that nine out of ten attacks or compromises to computer security have their origin in the phishing. It is the most common cyber crime, but contrary to what common sense dictates, there are several ways to achieve it. Known what are the attacks of phishing most used and what you can do to identify and prevent them.

You will be interested in:

With the technique of phishing, criminals pretend to be a trusted source for victims to provide personal information, such as usernames, passwords, or credit card numbers. Although the most common route is email, over time they have deployed other strategies that you must learn to identify.

The most used phishing

Email phishing

By far, it is the most used strategy. Hackers send out mass emails pretending to be from a legitimate organization. They are often written warning of compromises on personal accounts. The goal is for the victim to click on a malicious link that will take them to a fake page, where they will deliver the data to the attackers.

Spear Phishing

Unlike phishing Traditionally, this technique involves sending malicious emails to specific recipients in an organization. The emails behind the attacks spear phising they are usually personalized, since the objective is that the victim feels that they have a relationship with the sender.


It resembles the spear phishingBut instead of going after any employee within a company, it targets high-level executives with access to more sensitive data. These emails typically alert victims of a potential lawsuit or legal situation, encouraging recipients to click on the malicious link or attachment.


Instead of email, the smishing it takes advantage of text messages (SMS) to carry out its attacks. They work in the same way as email phishing attacks, that is, they include malicious links in SMS from what appear to be legitimate sources.


The phishing voice, known as vishing, He also uses the telephone for attacks. However, instead of an SMS, it does so through a call that pretends to come from a legitimate institution. Victims are alerted to suspicious card charges or activity and asked to provide private information such as credit card details to verify their identity.

Phishing by cloning

This method works by creating a malicious replica of a real message and having it forwarded. However, the links or attachments of the original email are replaced by malicious ones. Attackers forward messages using the settings exclusion in links or attachments.


Sextortion is mass emails, where hackers claim to have access to your account and your computer. They claim that they have a record of you watching videos of a sexual nature from your computer, while you had the camera turned on. They demand payments in bitcoins, because if you don’t they will deliver the video to family or colleagues.

How to identify a phishing email

The mails phishing they meet certain patterns that will allow you to quickly identify them. Anyway, if you are not sure, pay attention to the following criteria. In any case, remember that it is never recommended to click links or download files, unless you have requested them or are informed that they will be sent to you.

Editor’s Recommendations