A Comprehensive Review of Phishing Attacks Techniques, Types and Solutions

Authors

  • A Syed Mustafa HKBK College of Engineering, Bengaluru, Karnataka, India
  • Baby PN HKBK College of Engineering, Bengaluru, Karnataka, India
  • Divyashree N HKBK College of Engineering, Bengaluru, Karnataka, India
  • Iffath Fathima HKBK College of Engineering, Bengaluru, Karnataka, India
  • Javeria Fathima HKBK College of Engineering, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.46610/JoHTDCPCV.2024.v01i01.002

Keywords:

Blacklisting, Computer vision, Cyber-crime, Fuzzy approach, Heuristic method, Phishing attacks

Abstract

Phishing attacks continue to pose significant threats to individuals, businesses, and organizations worldwide. This paper presents an in-depth analysis of phishing attacks, focusing on their techniques, and highlighting their methods, consequences, and strategies for prevention. Through an extensive analysis of existing literature, this review aims to provide insights into the evolving nature of phishing attacks and effective strategies for detection, prevention, and mitigation. Scammers employ phishing, a con game, to get personal information from unwary users. False emails can have a startlingly authentic appearance, and even websites requesting personal information from consumers may seem genuine. Phishing is like lake fishing; however, instead of aiming to catch fish, phishers strive to obtain personal data. This article provides readers with a quick overview of phishing, its assaults, and precautions they may take to protect their private information. Phishing is an ever-expanding cyber threat that costs internet users billions of dollars in damages annually. It is an illegal operation that gathers private information from Internet users by using social engineering and other technologies.

Author Biographies

A Syed Mustafa, HKBK College of Engineering, Bengaluru, Karnataka, India

Professor, Department of Information Science and Engineering

Baby PN, HKBK College of Engineering, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science and Engineering

Divyashree N, HKBK College of Engineering, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science and Engineering

Iffath Fathima, HKBK College of Engineering, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science and Engineering

Javeria Fathima, HKBK College of Engineering, Bengaluru, Karnataka, India

Under Graduate Student, Department of Information Science and Engineering

Published

2024-04-15

How to Cite

A Syed Mustafa, Baby PN, Divyashree N, Iffath Fathima, & Javeria Fathima. (2024). A Comprehensive Review of Phishing Attacks Techniques, Types and Solutions. Journal of Hacking Techniques, Digital Crime Prevention and Computer Virology, 1(1), 15–24. https://doi.org/10.46610/JoHTDCPCV.2024.v01i01.002

Issue

Section

Articles