In order to fulfill the basic functions of our service, the user hereby agrees to allow Xiaomi to collect, process and use personal information which shall include but not be limited to written threads, pictures, comments, replies in the Mi Community, and relevant data types listed in Xiaomi's Private Policy. By selecting "Agree", you agree to Xiaomi's Private Policy and Content Policy .
Agree

Tech

[Discussion] What Is The Difference Between Phishing And Spam?

2019-06-15 02:58:48
519 8
Hello Mi Fans,
We all know very well that there are various types of attacks that we are exposed to at the moment, among which we can highlight the well-known and most used attacks and means, of course, phishing and spam that has become more advanced over time.

What Is The Difference Between Phishing And Spam?
Nowadays hacking is a very popular thing in our virtual environment and now this hacking has already begun to threaten sensitive data of numerous users. Hence, maximum numbers of hackers nowadays simply run for the money in illegal ways.

However, the fact is that there are various types of attacks that we are exposed to at the moment, among which we can highlight the well-known and most used attacks, of course, phishing attack and spam.

And these both attacks have become more advanced over time largely due to the new attack methods that are used, as they are not limited to fake websites and messages or emails that use fonts and designs from the originals to deceive us, but mainly the attackers now focus on the theft of data from social networks and the failure of security systems. So, now without wasting much time let’s know in brief about the Phishing and Spam.


What is Phishing?
It is one of the methods most used by cybercriminals to cheat and obtain confidential information in a fraudulent manner such as a password or detailed information on credit cards or other banking information of the victim, in order to cause economic losses. The imitation of full-fledged identity that, despite being a classical technique, causes great destruction.

The fraudsters simply use social engineering techniques that consists of obtaining essential information through the manipulation of legitimate users of the Internet or a service or an application.

Thus, the cybercriminal is posing as a person or company of trust in an apparent official electronic communication, usually an email or instant messaging system, social networks, SMS/MMS, or even using phone calls as well.

Fraudulent emails usually include a link that, when clicked, leads to false web pages. “In this way, the users’ simply believes that they are in a trusted place where they simply introduce the requested information that, in reality, goes to the hands of the scammer”.

The attack of “phishing” through SMS, is known as “smishing”, the user receives a text message trying to convince him/her to visit a fraudulent link. While in “vishing” the users’ simply receives a phone call that simulates coming from a bank requesting him/her to verify a series of data so that attacker could easily steal your money.


What is Spam?
Spam, or junk information, simply refer to those messages, with the unknown sender, that are not requested or desired by the user and, in addition, as a general rule, are sent in large quantities.

Think of our email, which we use to exchange messages with our friends and get in touch with people and organizations. The majority of spam, spreads information of an advertising nature, the reason for which it is sent in a massive way.

To do this, spammers are responsible for buying databases that include thousands of email addresses to make that shipment in large quantities. In addition, they often hide and misrepresent the true origin of the messages, so that it is not known who sends them, and also because these letters are intended, in many cases, to deceive and cheat the user and profit at their expense.

Advertising messages, on the other hand, do not always have to be labeled as “spam”. There are three aspects that the commercial mail must fulfill to be considered as junk mail:-


  • The impossibility of the user canceling his/her subscription through a simple and visible procedure from his/her message tray.
  • Information that violates the moral and does not warn about the contents or does not include a legal address of the sender.
  • Mass message sending to recipients who have not requested it and who have not authorized it.

However, the fact is that not all spam contents are advertising or have commercial purposes, but they can also be messages with political overtones, with claims of false unity donations, financial scams, and chains of letters or emails with attachments that simply alter into the installation of a malicious program. The last case is, perhaps, the most dangerous and, therefore, it is advisable to obtain an excellent antivirus capable of eliminating this computer virus.

As you will have noticed, in our explanation we have constantly alluded to e-mail, since this is the most common way that spam is used, although it is also defined as all free advertising information present in blogs, groups of news, forums, sites, and web pages, wikis, social networks, SMS, etc.

Now after knowing about these two well-known terms, of course, Phishing and Spam that we have mentioned above, I hope you all learned that what they are and how scammers simply use them in different ways simply to cheat users. So, what do you think about this? Simply share all your views and thoughts in the comment section below. And if you liked this explanatory post then do not forget to share this tutorial with your friends family.


Source

So, what do you think about this? Simply share all your views and thoughts in the comment section below.!
2019-06-15 02:58:48
Favorites1 RateRate
very informative
2019-06-15 03:36:28

Moderator

MH Imran | from Redmi Note 4

#2

Thanks for your information
2019-06-15 04:38:11

Techie Team

Mahmud Af Nahin | from Redmi Note 5

#3

Thanks for Information
2019-06-15 05:19:25

Master Bunny

Andrea3777 | from Mi MIX 2S

#4

Helpful thread.
Thank you very much!
2019-06-15 05:30:17

Grand Master Bunny

Ratpenat | from MI 5s

#5

Neither Phishing nor Spam, good thread, thanks
2019-06-15 06:13:48

Master Bunny

Specialist | from Redmi Note 4

#6

Thanks for sharing
2019-06-15 10:07:31

Device team

$huvo | from app

#7

Thanks for sharing
2019-06-15 14:58:45

Advanced Bunny

ARIFULRONY | from Redmi 5

#8

thanks for your information
2019-06-21 03:30:43
please sign in to reply.
Sign In Sign Up

Ar_Ashik

Moderator

  • Followers

    279

  • Threads

    128

  • Replies

    2040

  • Points

    22462

Aktywny 3 dni pod rząd
Aktywny 7 dni pod rząd
Aktywny 21 dni pod rząd
Aktywny 40 dni pod rząd
Aktywny 70 dni pod rząd
Aktywny 100 dni pod rząd
Newbie Member
The Motivator
Newbie Member
Mi A2
Eid Mubarak
MIUI 10
10K Members Celebration
2019
Throw Back with Mi 2018
20K Registered Users
9th Birthday of Xiaomi
40K Registered Users
50K Users

Read moreGet new
Copyright©2016-2019 Xiaomi.com, All Rights Reserved
Content Policy
Quick Reply To Top Return to the list