{"id":22425,"date":"2024-06-12T15:24:09","date_gmt":"2024-06-12T05:24:09","guid":{"rendered":"https:\/\/www.letsbemates.com.au\/mate\/?p=22425"},"modified":"2024-09-19T14:47:10","modified_gmt":"2024-09-19T04:47:10","slug":"what-is-phishing","status":"publish","type":"post","link":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/","title":{"rendered":"What is Phishing? \u2013 Learn how to stay safe online with MATE"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In cybersecurity, phishing is one of the most prevalent and damaging threats to personal and organisational security. At its core, phishing involves deceiving individuals into providing sensitive information, typically through fake emails or websites. This tactic plays on human psychology and has evolved into various forms, making it a significant concern in today&#8217;s digital landscape.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing attacks are alarmingly effective and widespread, with millions of people worldwide falling victim each year. According to <\/span><a href=\"https:\/\/www.stationx.net\/phishing-statistics\/#:~:text=An%20estimated%203.4%20billion%20emails,of%20all%20email%20traffic%20globally.\"><span style=\"font-weight: 400;\">recent reports<\/span><\/a><span style=\"font-weight: 400;\">, phishing is the most common type of cyber attack, and approximately 3.4 billion phishing emails are sent globally every day. As digital communication continues to grow, understanding what a phishing scam is, recognising its signs, and knowing how to protect yourself is essential for internet users everywhere.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Understanding phishing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing is a type of social engineering attack where attackers deceive individuals into revealing confidential information, such as login credentials, personal and financial information, or access to their computer systems. This malicious act is often carried out through phishing emails that mimic correspondence from legitimate websites or trusted sources. The term &#8220;phishing&#8221; is a homophone of &#8220;fishing&#8221;, reflecting the technique of baiting users into falling for the scam.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The origins of phishing date back to the mid-1990s, with the rise of the Internet. Over the years, as attackers have become more tech-savvy and the range of digital communication has expanded, phishing attacks have evolved in complexity and scope.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Types of phishing attacks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Here are some of the most common types of phishing attacks prevalent today:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email Phishing: <\/b><span style=\"font-weight: 400;\">This is the most common form of phishing, where attackers send phishing emails that appear to come from reputable sources. These emails often contain malicious links or attachments to steal personal and financial information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spear Phishing: <\/b><span style=\"font-weight: 400;\">Unlike the broader strategy of email phishing, spear phishing involves highly customised attacks targeted at specific individuals or organisations. Spear phishing attacks are designed to appear as legitimate as possible to trick the target into providing sensitive data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Whaling: <\/b><span style=\"font-weight: 400;\">This type of attack is a specific kind of spear phishing that targets senior executives and high-level officials. The goal is often to steal large sums of money or sensitive company information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Smishing and Vishing: <\/b><span style=\"font-weight: 400;\">These phishing attacks use SMS (smishing) and voice calls (vishing) to reach potential victims. Smishing might involve a text message prompting the user to visit a phishing website, while vishing involves a direct phone call to extract sensitive information directly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Clone Phishing: <\/b><span style=\"font-weight: 400;\">In this method, attackers create a nearly identical replica of a previously received email from a trusted sender, replacing legitimate links or attachments with malicious ones. The goal is to trick the user into thinking the updated version is authentic.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Angler Phishing:<\/b><span style=\"font-weight: 400;\"> Utilising social media platforms to launch attacks, angler phishing targets users by masquerading as customer support accounts. These fake accounts often reach out to individuals discussing their grievances online, offering a fake resolution link that leads to a fake website.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Understanding these types of phishing attacks is important if you want to detect different scams and safeguard yourself against potential threats.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How Phishing Works<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing attacks, designed to steal personal information, often follow a simple process. Here\u2019s a typical step-by-step breakdown:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Strategy: <\/b><span style=\"font-weight: 400;\">Attackers choose their target and tailor their approach based on the victim\u2019s background, activities, and possible vulnerabilities. This often involves gathering preliminary data to make the attack more convincing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Lure Creation: <\/b><span style=\"font-weight: 400;\">Phishers create enticing emails or messages that mimic legitimate sources, such as reputable companies or known contacts. These messages are crafted to create a sense of urgency or importance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Link or Attachment:<\/b><span style=\"font-weight: 400;\"> These emails typically include a fake link or an infected attachment. The link directs the user to a fake website that mirrors a legitimate site, asking for sensitive information, while attachments may contain malware designed to steal data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data Harvesting: <\/b><span style=\"font-weight: 400;\">When the victim enters information on a fake website or opens an attachment, the phisher quickly captures the provided data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exploitation: <\/b><span style=\"font-weight: 400;\">With access to personal data, attackers can commit fraud, access bank accounts, or even launch further attacks against other targets.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">By recognising the sequence\u2014from the initial targeting and lure creation to the final exploitation\u2014you can better guard against falling into phishing traps.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Psychological Tactics Used in Phishing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing is deeply rooted in psychological manipulation, using social engineering to exploit human emotions. Phishers often impersonate credible sources, like well-known financial institutions or high-ranking company officials, making their communications appear legitimate and trustworthy. This exploitation of trust convinces victims of the authenticity of the request.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adding to the complexity, attackers create a sense of urgency or threaten loss, compelling victims to act hastily and bypass their usual rational decision-making processes. For instance, a phishing email might urgently warn of a security breach or threaten account closure if immediate action isn&#8217;t taken, pressing the recipient into quick, often regrettable actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing attempts also play on human curiosity and greed, with promises of rewards or exclusive access to enticing content. These offers tap into natural desires and can be particularly difficult to ignore. Alternatively, some phishers use fear tactics, such as the threat of legal action or significant financial loss, to provoke a stressed response.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Signs and Indicators of a Phishing Attempt<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing attacks often share common characteristics that can alert you to their malicious intentions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Unusual Sender: <\/b><span style=\"font-weight: 400;\">Whether it&#8217;s a phishing email or a text message, the sender might appear unfamiliar, or it might mimic a known contact or organisation but with slight variations in the email address or phone number.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Urgency in Communication: <\/b><span style=\"font-weight: 400;\">Phishing messages commonly create a sense of urgency, pressuring you to act quickly. Watch out for phrases like &#8220;immediate action required&#8221; or &#8220;limited time offer.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Requests for Personal Information: <\/b><span style=\"font-weight: 400;\">Legitimate organisations typically don\u2019t request sensitive personal and financial information via email or text messages. Be wary of any communication asking for your login credentials, credit card details, or other personal data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Suspicious Links and Attachments: <\/b><span style=\"font-weight: 400;\">Hover over any links without clicking them to see if they redirect to a legitimate website. Be cautious of emails and messages that include unsolicited attachments, as they could contain malicious software.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By staying vigilant and questioning the legitimacy of unusual senders, urgent communications, unsolicited requests for personal information, and suspicious links or attachments, you can significantly reduce your risk of falling victim to these deceptive schemes. Always exercise caution and double-check the sources before responding to any requests that could compromise your security.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The Impact of Phishing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing attacks have serious consequences that can affect individuals and organisations long after the initial breach. Here are three critical impacts that can arise from data being stolen through a phishing attack:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Financial Loss and Identity Theft<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing often leads to direct financial loss. Attackers may gain access to bank accounts, credit card details, and other financial information, enabling them to make unauthorised transactions or open new accounts in the victim&#8217;s name. The long-term impact of identity theft can be devastating, requiring a lot of effort and time to resolve fraudulent activities and restore your financial health.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Compromise of Sensitive Information<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing can expose sensitive personal and corporate information. For individuals, this may include personal identification details, private communications, or personal health records. For organisations, a phishing attack can lead to the leakage of confidential business data, customer information, and strategic plans, putting the entire business at risk of espionage or competitive disadvantage.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Damage to Reputation and Trust<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">For businesses, the repercussions of a phishing attack can extend beyond immediate financial or data losses to include long-term reputational damage. Customers and partners may lose trust in a company&#8217;s ability to safeguard their data. Rebuilding trust can be a lengthy and costly process, negatively impacting the company&#8217;s market position and profitability.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How to Protect Yourself From Phishing<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing scams can lead to identity theft, financial loss, and significant privacy breaches. Here are practical steps and recommendations on utilising tools and technologies to bolster your defences against phishing attempts:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Educate Yourself and Others: <\/b><span style=\"font-weight: 400;\">Stay informed about the latest phishing tactics as scammers constantly evolve their methods.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Verify Before You Click: <\/b><span style=\"font-weight: 400;\">Always verify the authenticity of requests for personal information. Contact the organisation directly using a trusted number or website, not the contact details provided in a suspicious email or text message.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use Strong, Unique Passwords: <\/b><span style=\"font-weight: 400;\">Create strong passwords and change them regularly. Consider using a password manager to manage and store your passwords securely.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enable Two-Factor Authentication (2FA): <\/b><span style=\"font-weight: 400;\">Requiring two forms of identification can add an extra layer of security and significantly decrease the risk of unauthorised access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use Spam Filters: <\/b><span style=\"font-weight: 400;\">Advanced spam filters can detect phishing emails, reducing the number of malicious emails that reach your inbox.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Install Antivirus Software: <\/b><span style=\"font-weight: 400;\">Ensure your antivirus is up-to-date and includes phishing prevention solutions that can scan and remove potential threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use Phishing Firewalls: <\/b><span style=\"font-weight: 400;\">Some firewalls can be configured to block known phishing websites or fake websites that mimic legitimate ones.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use<\/b> <b>Email Authentication Tools: <\/b><span style=\"font-weight: 400;\">Tools like SPF, DKIM, and DMARC can help verify that emails are from a legitimate source and not spoofed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regularly Update and Patch Software: <\/b><span style=\"font-weight: 400;\">Keep your operating system, antivirus software, and applications updated. Cybercriminals often exploit vulnerabilities in outdated software.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By integrating these best practices and tools into your daily digital routine, you can enhance your resilience against phishing attacks and help ensure your online safety. Remember, the key to combating phishing is vigilance and proactive cybersecurity measures.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What to Do If You Fall for a Phishing Attack<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Realising you&#8217;ve been a victim of the phishing attack can be distressing, but taking swift action can mitigate the damage. Here\u2019s what you need to do immediately if you suspect you&#8217;ve been compromised by a phishing attack:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Change Your Passwords: <\/b><span style=\"font-weight: 400;\">First, change the passwords for all affected accounts. If you use the same password on other sites, change those to prevent further unauthorised access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Alert Your Financial Institutions: <\/b><span style=\"font-weight: 400;\">Contact your bank and credit card companies immediately to inform them of the potential breach. They can monitor your accounts for suspicious activity and, if necessary, freeze your accounts to prevent further fraud.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Update Your Security Software:<\/b><span style=\"font-weight: 400;\"> Ensure your security software is up-to-date and run a full system scan to check for any malware that may have been installed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enable Two-Factor Authentication: <\/b><span style=\"font-weight: 400;\">If your accounts don\u2019t already have two-factor authentication enabled, turn it on for added security. This provides an extra layer of security beyond your password.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Check for Signs of Identity Theft:<\/b><span style=\"font-weight: 400;\"> In the following weeks and months, monitor your credit reports and account statements for any signs of unauthorised activity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Report to the Relevant Authorities: <\/b><span style=\"font-weight: 400;\">Report the email or <\/span><a href=\"https:\/\/www.letsbemates.com.au\/mate\/faq\/report-suspicious-sms-mms\/\"><span style=\"font-weight: 400;\">SMS phishing<\/span><\/a><span style=\"font-weight: 400;\"> scam to the <\/span><a href=\"https:\/\/www.scamwatch.gov.au\/report-a-scam\"><span style=\"font-weight: 400;\">National Anti-Scam Centre<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Contact Local Law Enforcement: <\/b><span style=\"font-weight: 400;\">Contact your local law enforcement agency if the phishing attack has led to financial loss or other criminal activity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Inform Your IT Department:<\/b><span style=\"font-weight: 400;\"> If the phishing attack occurred through your work email, immediately inform your organisation&#8217;s IT department so they can take steps to secure the network and prevent further incidents.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Taking these steps promptly can help minimise the impact of a phishing attack and protect your personal and financial information from further risk. It&#8217;s crucial to stay informed about phishing tactics and remain vigilant against future attacks.<\/span><\/p>\n    <div id=\"cta-nbn-btns\">\r\n        <div class=\"review-content-wrapper cta-nbn-btns d-flex flex-column flex-lg-row\">\r\n            <div class=\"rating d-flex flex-column flex-lg-row align-items-center\">\r\n                <div class=\"stars d-flex flex-row align-items-center justify-content-center mx-n1 mb-3 mb-lg-0 me-3\">\r\n                    <div class=\"item\">\r\n                        <img class=\"me-1\" loading=\"lazy\" src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/stars-full.png\" alt=\"star-1\" style=\"width: 24px; height: 24px;\">\r\n                    <\/div>\r\n                    <div class=\"item\">\r\n                        <img class=\"me-1\" loading=\"lazy\" src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/stars-full.png\" alt=\"star-2\" style=\"width: 24px; height: 24px;\">\r\n                    <\/div>\r\n                    <div class=\"item\">\r\n                        <img class=\"me-1\" loading=\"lazy\" src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/stars-full.png\" alt=\"star-3\" style=\"width: 24px; height: 24px;\">\r\n                    <\/div>\r\n                    <div class=\"item\">\r\n                        <img class=\"me-1\" loading=\"lazy\" src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/stars-full.png\" alt=\"star-4\" style=\"width: 24px; height: 24px;\">\r\n                    <\/div>\r\n                    <div class=\"item\">\r\n                        <img class=\"me-1\" loading=\"lazy\" src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/stars-full.png\" alt=\"star-5\" style=\"width: 24px; height: 24px;\">\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"info mb-3 mb-lg-0 me-3\">\r\n                    Over<span class=\"no\"> 2500 <\/span> <span class=\"remarks\">5-star <\/span>reviews\r\n                <\/div>\r\n            <\/div>\r\n            <div class=\"product-review ms-3\">\r\n                <img src=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/themes\/custom-theme\/assets\/images\/product-review.png \" alt=\"Product Review\" class=\"img-fluid\" height=\"32\" width=\"161\" style=\"height:32px;width:161px\">\r\n            <\/div>\r\n        <\/div>\r\n        <div class=\"content-bottom-links pt-3 mt-3 border-top\">\r\n            <div class=\"wrap\">\r\n                <h4 class=\"mb-4 flex-column flex-lg-row justify-content-start\">\r\n                    Are you ready to be our mate? Call now\r\n                    <a href=\"tel:13 14 13\" class=\"info-custombtn align-items-center\">\r\n                        <i class=\"fas fa-phone\"><\/i>\r\n                        <span class=\"tracknumber fs-5\">13 14 13<\/span>\r\n                    <\/a>\r\n                <\/h4>\r\n                <ul class=\"links list-unstyled d-flex flex-column flex-lg-row mt-3\">\r\n                    <li class=\"pb-3 pb-lg-0 pe-3\">\r\n                        <a href=\"https:\/\/www.letsbemates.com.au\/nbn\/\" class=\"btn btn-lg btn-yellow fs-16\">See our internet plans<\/a>\r\n                    <\/li>\r\n                    <li class=\"pb-3 pb-lg-0 pe-3\">\r\n                        <a href=\"https:\/\/www.letsbemates.com.au\/mobile\/\" class=\"btn btn-lg btn-yellow fs-16\">See our mobile plans<\/a>\r\n                    <\/li>\r\n                    <li class=\"pb-3 pb-lg-0 pe-3\">\r\n                        <!-- <a href=\"https:\/\/www.letsbemates.com.au\/nbn\/\" class=\"btn btn-lg btn-yellow\">see our bundle plans<\/a> -->\r\n                        <a href=\"https:\/\/www.letsbemates.com.au\/mate\/bundles\/\" class=\"btn btn-lg btn-yellow fs-16\">See our bundle plans<\/a>\r\n                    <\/li>\r\n                <\/ul>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n    \n<div>\n<div style=\"position: fixed; bottom: 10px; right: 20px; z-index: 2147483647;\"><\/div>\n<\/div>\n<div>\n<div style=\"position: fixed; bottom: 10px; right: 20px; z-index: 2147483647;\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In cybersecurity, phishing is one of the most prevalent and damaging threats to personal and organisational security. At its core, phishing involves deceiving individuals into providing sensitive information, typically through fake emails or websites. This tactic plays on human psychology and has evolved into various forms, making it a significant concern in today&#8217;s digital landscape&#8230;.<\/p>\n","protected":false},"author":3,"featured_media":22502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[22],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Phishing? \u2013 Learn how to stay safe online with MATE<\/title>\n<meta name=\"description\" content=\"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Phishing? \u2013 Learn how to stay safe online with MATE\" \/>\n<meta property=\"og:description\" content=\"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"mate\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/matecommunicate\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T05:24:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T04:47:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2024\/06\/What-is-Phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"MATE Marketing Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@matecommunicate\" \/>\n<meta name=\"twitter:site\" content=\"@matecommunicate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MATE Marketing Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\"},\"author\":{\"name\":\"MATE Marketing Team\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/1a486986e451f5228059cbd388d48202\"},\"headline\":\"What is Phishing? \u2013 Learn how to stay safe online with MATE\",\"datePublished\":\"2024-06-12T05:24:09+00:00\",\"dateModified\":\"2024-09-19T04:47:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\"},\"wordCount\":1871,\"publisher\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#organization\"},\"articleSection\":[\"Internet &amp; Mobile Security Blog | MATE\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\",\"url\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\",\"name\":\"What is Phishing? \u2013 Learn how to stay safe online with MATE\",\"isPartOf\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#website\"},\"datePublished\":\"2024-06-12T05:24:09+00:00\",\"dateModified\":\"2024-09-19T04:47:10+00:00\",\"description\":\"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.letsbemates.com.au\/mate\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Phishing? \u2013 Learn how to stay safe online with MATE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#website\",\"url\":\"https:\/\/www.letsbemates.com.au\/mate\/\",\"name\":\"mate\",\"description\":\"Mate Site\",\"publisher\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.letsbemates.com.au\/mate\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#organization\",\"name\":\"Mate Communicate\",\"url\":\"https:\/\/www.letsbemates.com.au\/mate\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2019\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2019\/06\/logo.png\",\"width\":115,\"height\":31,\"caption\":\"Mate Communicate\"},\"image\":{\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/matecommunicate\",\"https:\/\/twitter.com\/matecommunicate\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/1a486986e451f5228059cbd388d48202\",\"name\":\"MATE Marketing Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1595823017d494e67ca7f3ea98290bf8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1595823017d494e67ca7f3ea98290bf8?s=96&d=mm&r=g\",\"caption\":\"MATE Marketing Team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Phishing? \u2013 Learn how to stay safe online with MATE","description":"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/","og_locale":"en_US","og_type":"article","og_title":"What is Phishing? \u2013 Learn how to stay safe online with MATE","og_description":"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.","og_url":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/","og_site_name":"mate","article_publisher":"https:\/\/www.facebook.com\/matecommunicate","article_published_time":"2024-06-12T05:24:09+00:00","article_modified_time":"2024-09-19T04:47:10+00:00","og_image":[{"width":950,"height":650,"url":"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2024\/06\/What-is-Phishing.png","type":"image\/png"}],"author":"MATE Marketing Team","twitter_card":"summary_large_image","twitter_creator":"@matecommunicate","twitter_site":"@matecommunicate","twitter_misc":{"Written by":"MATE Marketing Team","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#article","isPartOf":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/"},"author":{"name":"MATE Marketing Team","@id":"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/1a486986e451f5228059cbd388d48202"},"headline":"What is Phishing? \u2013 Learn how to stay safe online with MATE","datePublished":"2024-06-12T05:24:09+00:00","dateModified":"2024-09-19T04:47:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/"},"wordCount":1871,"publisher":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/#organization"},"articleSection":["Internet &amp; Mobile Security Blog | MATE"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/","url":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/","name":"What is Phishing? \u2013 Learn how to stay safe online with MATE","isPartOf":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/#website"},"datePublished":"2024-06-12T05:24:09+00:00","dateModified":"2024-09-19T04:47:10+00:00","description":"Find out more about phishing\u2014a prevalent cyber threat involving deceit to extract sensitive information. Learn to identify and thwart phishing attacks effectively.","breadcrumb":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.letsbemates.com.au\/mate\/what-is-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.letsbemates.com.au\/mate\/"},{"@type":"ListItem","position":2,"name":"What is Phishing? \u2013 Learn how to stay safe online with MATE"}]},{"@type":"WebSite","@id":"https:\/\/www.letsbemates.com.au\/mate\/#website","url":"https:\/\/www.letsbemates.com.au\/mate\/","name":"mate","description":"Mate Site","publisher":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.letsbemates.com.au\/mate\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.letsbemates.com.au\/mate\/#organization","name":"Mate Communicate","url":"https:\/\/www.letsbemates.com.au\/mate\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/logo\/image\/","url":"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2019\/06\/logo.png","contentUrl":"https:\/\/www.letsbemates.com.au\/mate\/wp-content\/uploads\/2019\/06\/logo.png","width":115,"height":31,"caption":"Mate Communicate"},"image":{"@id":"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/matecommunicate","https:\/\/twitter.com\/matecommunicate"]},{"@type":"Person","@id":"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/1a486986e451f5228059cbd388d48202","name":"MATE Marketing Team","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.letsbemates.com.au\/mate\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1595823017d494e67ca7f3ea98290bf8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1595823017d494e67ca7f3ea98290bf8?s=96&d=mm&r=g","caption":"MATE Marketing Team"}}]}},"_links":{"self":[{"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/posts\/22425"}],"collection":[{"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/comments?post=22425"}],"version-history":[{"count":6,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/posts\/22425\/revisions"}],"predecessor-version":[{"id":24087,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/posts\/22425\/revisions\/24087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/media\/22502"}],"wp:attachment":[{"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/media?parent=22425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/categories?post=22425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.letsbemates.com.au\/mate\/wp-json\/wp\/v2\/tags?post=22425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}