Phishing techniques, consequences and protection tips | ICT Security-Sécurité PC et Internet | Scoop.it


What happens once your identity gets stolen? How exactly does a phisher benefit from gaining access to your sensitive information? What can he do?

Of course it depends on the information stolen, and the goal of the hacker, as to what can be done with sensitive information. The first thing to clarify is that there are two types of phishing attacks – consumer oriented phishing attacks and enterprise oriented phishing attacks.