This document summarizes common and emerging phishing techniques and methods to mitigate associated security risks. It begins with a brief history of phishing, including early phishing scams targeting AOL users in the 1990s. It then describes classic phishing attack vectors such as social engineering techniques that exploit human curiosity, fear, and empathy. One such classic technique is distributing malware via email attachments or links that appear to be gifts or prizes but instead install Trojan horse programs on victims' computers. The document aims to educate about phishing risks and prevention.
Related topics: