Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed to look like they are official. Phishing s also request immediate visit to update personal details.
Spear phishing are highly specialized attacks that are targeted to small groups in collecting information to have access to many systems. Social networks may be effected by spam or malware links that are added in apps or compromised accounts.
An electronic equivalent of junk, bulk, unwanted, or unsolicited . Ensuring the filtered junk mail is a way to check the needed s from the unwanted ones. Limiting viewers accessibility to the profile blocks unnecessary online presence of people.
Creating TCP/IP packets to use someone’s else’s IP address to hide the original IP like chatting on-line, sending s, and surfing the web. Man-in-the-middle, routing redirect, source routing, blind spoofing, and flooding are examples of spoofing.