Five Common Security Scams

  • Phishing: Emails aimed at luring recipients to click on an embedded link, which could trigger a malware installation, or surrendering confidential information such as passwords or credit card numbers.
  • Spear-Phishing: Attackers gather specific personal data and often impersonate friends or business associates, including mimicking their email addresses (a tactic called “spoofing”) to craft an especially realistic message.
  • Vishing: Telephone-based phishing scams to gain access to confidential information.
  • Smishing: Text-based phishing scams to gain access to confidential information.
  • Social Engineering: Manipulation to gain access to secure areas using psychological tactics either to avoid appearing as a security risk or to convince people not to enforce security procedures.