Human Firewall | Tip # 9: Types of Phishing

Human Firewall Tip # 9: Types of Phishing


One of the social engineering techniques that we have discussed in Human Firewall Tip # 7 is Phishing. Imagine, an attacker or a "phisher-man" sends thousands of emails across. Once the phishing email is successfully sent out, it is a matter of waiting game until someone fell into the "trap" which is either malicious link was clicked or downloaded a malware-infected attachment. As a simple analogy, this is one (phisher-man) to many (potential victims with email addresses). Some of the types of Phishing are the following:

  • Spearphishing, on the other hand, knows something about the victim. This made it easy for the attacker to craft emails that can be related to the victim i.e. email will come from someone the victim knows or working with.
  • Vishing on the other hand is done via phone calls. The "vishers" are pretending to be from utilities company and will ask for your personal details like credit card. Some of the most common examples according to Fraud Watch International includes unsolicited offers for credit and loans, exaggerated investment opportunities, charitable requests for urgent causes or even extended car warranty scams
  • Smishing is using SMS or TXT messages. "Smishermen" will trick you so you can give them what they want like your bank details, username and passwords or even your physical address. Like phishing, Smishing can grab your data by sending you malicious attachments like applications with malware or directing you to go to a malware-infected website that will automatically download to your mobile device. 

Different types but same intention - that is to get your personal data, bank account details or just to take control of your computer. On our next Human Firewall Tip, we are going to share how to protect yourself from these attacks. Being a Human Firewall means being familiar of "who are your enemies" so that you understand how they strike, their motives and weakness. 

Watch this space as we build the Human Firewall together.

Human Firewall Tip # 9 Types of phishing www.buildinghumanfirewall.com

Disclaimer: Following the Human Firewall tips are at your own discretion. Any actions you may take upon the information on this page is strictly at your own risk.


1 comment


  • jake

    The increasing prevalence of online theft targeting digital assets is disheartening, causing potential investors to hesitate in taking advantage of this lucrative investment opportunity. Personally, I experienced a loss of $474,000 when I fell victim to an online Pocket Options Broker. They enticed me with promises of high returns on my investment, but when I tried to access the investment website later on, I was denied entry. Despite my attempts to contact their support team, I soon realized that I had been scammed.

    Desperate to recover my funds, I turned to the internet for solutions and came across Agent Wilford from Recovery Hub. His excellent reputation for providing exceptional recovery services caught my attention. Taking a leap of faith, I decided to reach out to him, and to my amazement, within 24 hours, he successfully helped me retrieve all my lost funds. I cannot express enough how grateful I am for his outstanding service.

    If you find yourself in a similar situation, I strongly recommend seeking assistance from Wilford at (contact@cyberjusticerecoveryhub.com) for unmatched recovery support.


Leave a comment


Please note, comments must be approved before they are published