Phishing refers to a variety of attacks that are intended to convince you to forfeit sensitive data to an imposter. These attacks can take a number of different forms; from spear-phishing (which targets a specific individual within an organization), to whaling (which goes one step further and targets senior executives or leaders). Furthermore, phishing attacks take place over multiple channels or even across channels; from the more traditional email-based attacks to those using voice – vishing – to those coming via text message – smishing. Regardless of the type or channel, the intent of the attack is the same – to exploit human nature to gain control of sensitive information (citation 1). These attacks typically make use of several techniques including impersonated websites, attacker-in-the-middle, and relay or replay to achieve their desired outcome.


More

ID Tech: SK Telecom Joins FIDO Alliance Board as Passkeys Adoption Accelerates

SK Telecom has been appointed to the FIDO Alliance Board of Directors, adding a major…

Read More →

PC Mag: Still Using Passwords? That’s Risky. Here’s Why You Should Switch to Passkeys Now

Even though everyone knows 12345″ is a terrible password, it still lands at the top of…

Read More →

Wired: How Passkeys Work—and How to Use Them

Passwords suck. They’re hard to remember, but worse is playing the ever-evolving game of cybersecurity…

Read More →


123313 Next

Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.