The Ultimate Guide to Phishing
2024 edition
Overview
Generally associated with unsolicited emails sent by a hacker to a wide range of targets, phishing is a ‘bait and switch’ tactic designed to trick targets into revealing personal information such as passwords or credit card details. The phishing email purports to be from a known party such as a bank or a colleague and requests a response which can include redirection to a spoof website where (for example) the target is encouraged to bank usernames or passwords. Phishing is a form of social engineering.
Analyst reports
![Story image](../../../../../uploads/story/2024/06/13/preview_techday_9e9f9517d539ed5ef5ff.webp)
Gartner on Email Security
Arctic Wolf enhances identity protection with new ITDR ...
Last month
![Story image](../../../../../uploads/story/2024/02/01/preview_img-gujxL7Hf7aZYYZNBcUEF0ilO.webp)
IDC on Malware
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
![Story image](../../../../../uploads/story/2024/02/02/preview_img-YDGDAciJ1dkcl9NcrozcpbHW.webp)
IDC on Malware
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
![Story image](../../../../../uploads/story/2023/12/20/preview_img-7MR98B1R1ArpoqIpCGuCHExp.webp)
Gartner on Cloud Security
2024 to witness renewed focus on cyber resilience
Wed, 20th Dec 2023
![Story image](../../../../../uploads/story/2023/10/23/preview_email.webp)
Gartner on Email Security
EasyDMARC launches EasySender to improve email delivera...
Mon, 23rd Oct 2023
Expert columns
![Story image](../../../../../uploads/story/2024/07/11/preview_Ashley_Diffey_Ping_Identity__1_.webp)
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
This month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f4ab0d15ef268854d321.webp)
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
![Story image](../../../../../uploads/story/2024/06/18/preview_Why_data_is_still_leaking_cover_image_SquareX.webp)
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Last month
![Story image](../../../../../uploads/story/2024/06/06/preview_techday_c79ed9988a8da67dbb08.webp)
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Last month
![Story image](../../../../../uploads/story/2024/06/06/preview_img-oR1vUJ0k6ooyYKa5F6B98fNd.webp)
By Stephen Kho of Avast
What is MFA bombing? Apple users were targeted using th...
Last month
More expert columns
![Story image](../../../../../uploads/story/2024/05/27/preview_img-5SUkJBu0m0L3Q1fD22a6oIOf.webp)
By Jason Whyte of Trustwave
Why strong passwords are still the first line of defenc...
Mon, 27th May 2024
![Story image](../../../../../uploads/story/2024/05/27/preview_img-qQlr8KBr5stgb69tEnzO1LBQ.webp)
By Vivienne Horsfall of Transmit Security
Converging identity management and fraud prevention for...
Mon, 27th May 2024
![Story image](../../../../../uploads/story/2024/05/13/preview_Ashwin_Ram_-_Check_Point_Software.webp)
By Ashwin Ram of Check Point Software Technologies
Collaboration tools are now at the frontline in the bat...
Mon, 13th May 2024
![Story image](../../../../../uploads/story/2024/05/06/preview_Anthony_Daniel_.webp)
By Anthony Daniel of WatchGuard Technologies
How the evolution of AI will reshape cybersecurity
Mon, 6th May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-7eyWPfRIYcR4ZC7PEgtKJcnm.webp)
By Mark Gorrie of Gen Digital Inc
What is vishing? Tips to spot and avoid voice phishing ...
Thu, 2nd May 2024
![Story image](../../../../../uploads/story/2024/04/11/preview_img-d4NMagp645BWLXMFXhpOSgKW.webp)
By Sumit Bansal of BlueVoyant
The rising threat of search engine ad abuse
Thu, 11th Apr 2024
Top players
You can read more from the top players 2degrees, KnowBe4, Check Point Software, Google, and Barracuda Networks.
Recent news
![Story image](../../../../../uploads/story/2024/07/25/preview_techday_ee857980f3a6c6b5ab17.webp)
About Spam
Kaspersky highlights the critical role of phone numbers...
3 days ago
![Story image](../../../../../uploads/story/2024/07/19/preview_techday_70d0d7d5c5bca2a2bf6b.webp)
About Bring Your Own Device
Fortinet reveals rising cyber threats targeting Paris 2...
Last week
![Story image](../../../../../uploads/story/2024/07/19/preview_techday_1737fdbd0c4ac0d841f0.webp)
About Software Updates
IT professionals urged to secure networks before summer...
Last week
![Story image](../../../../../uploads/story/2024/07/17/preview_techday_ea83a32ccf99ce2a50c8.webp)
About Marketing Technologies
Kaspersky reports surge in hybrid phishing campaigns fo...
Last week
![Story image](../../../../../uploads/story/2024/07/16/preview_techday_4a83d2960cf017099387.webp)
About Firewalls
Criminals misuse URL protection to mask phishing attack...
Last week
More news
![Story image](../../../../../uploads/story/2024/07/16/preview_techday_0658edd47427a40d0710.webp)
About Productivity
BlueVoyant unveils new Cyber Defense Platform for enhan...
Last week
![Story image](../../../../../uploads/story/2024/07/04/preview_techday_3fb6b434e49fd9ea168b.webp)
About Malware
NCSC's Malware Free Network disrupts 10 million cyber t...
This month
![Story image](../../../../../uploads/story/2024/06/28/preview_techday_2de3e7d80da07eaa9046.webp)
About Software Updates
Bitdefender & Netgear report reveals major IoT vulnerab...
Last month
![Story image](../../../../../uploads/story/2024/06/27/preview_techday_8dc11ab04551bd637a86.webp)
About Ransomware
Trustwave report highlights severe cybersecurity threat...
Last month
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_48ed5faf07a9aa6554be.webp)
About Endpoint Protection
Akamai report: 42% of web traffic driven by bots, 65% m...
Last month
Even more news
![Story image](../../../../../uploads/story/2024/06/24/preview_techday_fdaf0ca747c91284b67e.webp)
About Software Updates
Cyber threats surge during Australia's EOFY tax season
Last month
![Story image](../../../../../uploads/story/2024/06/24/preview_techday_f90b21f2a8da77a3c491.webp)
About Collaboration
Dataglobal & SoSafe partner to enhance email security
Last month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f22a068094df723fedb8.webp)
About Cloud Services
Businesses to increase cloud use by 85% in next five ye...
Last month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_bd80cee9092ab6d1fd7e.webp)
About Ransomware
Inside the day-to-day challenges of Splunk's CISO Jason...
Last month
![Story image](../../../../../uploads/story/2024/06/19/preview_techday_06ddfe8517da9c907719.webp)
About Data breach
Research shows mobile workers put corporate data at sig...
Last month
Other guides
You can read other related guides from Email Security, Cybersecurity, Breach Prevention, Malware, and Firewalls.
Powered by