There are different types of attacks targeting human nature and the psychology of the user behind the device (smart phone, tablet, computer). These attacks are targeting not so much to breach the security of the actual device, as to trick the user and thereby gain access to their data such as credit or debit card numbers, PIN code, username and password, etc. These attacks are commonly known as Phishing. The difference in names comes from the channel used for the attack:
- Phishing - an attack using e-mail as a means of obtaining sensitive information. It is usually random and fairly easy to recognise.
- Smishing - an attack using mobile SMS as a means of obtaining sensitive information.
- Vishing - an attack using a voice call (Voice) as a means of obtaining sensitive information.
- Spear phishing - a phishing attack targeting specific user groups. The attack is well prepared and targets user groups that present common characteristics.
- Whaling - a phishing attack targeted at senior-level position employees or system administrators (from the English term “whale”).
Business Email Compromise (BEC) or CEO Fraud is a phishing attack targeting the top level executive roles in an organization. The purpose is to mislead people who would normally be authorised to order or confirm large cash payments or money transfers. In this way a “fake” manager or director can deceive them into making payments.