All Products
Search
Document Center

Phishing Attacks and Defense

Last Updated: Oct 28, 2021

Phishing attacks are intended to induce recipients to provide sensitive information (such as account numbers, passwords, bank cards, etc.) by sending a large number of deceptive spam messages claiming to come from authoritative organizations.

Common attack methods

Phishing attacks use a variety of techniques to make the display of an email message or web page show deceptive differences from its operation. Some of the more common attack techniques are listed below.

  • Use a domain name similar to a domain A and copy the page content of the domain A to achieve the purpose of counterfeiting domain A’s website.

  • Hide the URL.

  • Deceptive hyperlinks.

  • A pop-up window appears.

    What is displayed in the browser is a real web page, but a window pops up on the page asking the user to enter personal information.

What is the harm of phishing attacks

Phishing attackers use deceptive emails and fake website pages to carry out network fraud activities. Victims often disclose their personal information, such as credit card numbers, bank card accounts, ID number, etc.

How to defend against phishing attacks

  • Don't open links of unknown origin or emails sent by strangers.

  • Perform security hardening on servers or terminal computers, install antivirus software, and upgrade virus databases and operating system patches in a timely manner.