Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Learn Phishing | Introduction to Cyber Security
Cybersecurity Fundamentals

bookPhishing

Phishing is a cyber-attack where attackers attempt to trick individuals into divulging sensitive information, such as login credentials or financial details, by posing as trustworthy entities through deceptive emails, messages, or websites.

How to detect phishing?

  • Check the Sender's Email Address: Verify the sender's email address, especially if the email appears unexpected or requests sensitive information;
  • Inspect URLs: Hover over hyperlinks to reveal the actual URL. Be cautious if the link address seems suspicious or differs from what's expected;
  • Look for Generic Greetings: Phishing emails often use generic greetings, lacking personalized information.

Phishing protection

question mark

What is the primary goal of a phishing attack?

Select the correct answer

Everything was clear?

How can we improve it?

Thanks for your feedback!

SectionΒ 1. ChapterΒ 4

Ask AI

expand

Ask AI

ChatGPT

Ask anything or try one of the suggested questions to begin our chat

Suggested prompts:

Ask me questions about this topic

Summarize this chapter

Show real-world examples

Awesome!

Completion rate improved to 5

bookPhishing

Swipe to show menu

Phishing is a cyber-attack where attackers attempt to trick individuals into divulging sensitive information, such as login credentials or financial details, by posing as trustworthy entities through deceptive emails, messages, or websites.

How to detect phishing?

  • Check the Sender's Email Address: Verify the sender's email address, especially if the email appears unexpected or requests sensitive information;
  • Inspect URLs: Hover over hyperlinks to reveal the actual URL. Be cautious if the link address seems suspicious or differs from what's expected;
  • Look for Generic Greetings: Phishing emails often use generic greetings, lacking personalized information.

Phishing protection

question mark

What is the primary goal of a phishing attack?

Select the correct answer

Everything was clear?

How can we improve it?

Thanks for your feedback!

SectionΒ 1. ChapterΒ 4
some-alt