About 765,000 results
Open links in new tab
  1. Data Spotlight | Federal Trade Commission

    Scammers are hiding in plain sight on social media platforms and reports to the FTC’s Consumer Sentinel Network point to huge profits. One in four people who reported losing money to fraud …

  2. CISA Releases Phishing Infographic

    Dec 8, 2022 · This infographic provides a visual summary of how threat actors execute successful phishing operations. Details include metrics that compare the likelihood of certain types of …

  3. Understanding and Preventing Phishing Attacks - United States ...

    May 21, 2025 · These deceptive attacks can happen through e-mail, text message, or even voice calls. By creating a sense of trust and urgency, cybercriminals hope to prevent you from …

  4. data flow diagram of the process (flowchart): what do we collect from where/whom, what do we do with it, where do we keep it, to whom do we give it? detailed description of the purpose(s) of …

  5. Phishing Diagram - Voice Phishing

    May 12, 2025 · Using our phishing diagram, you can quickly identify warning signs: unexpected contact, a high-pressure situation, and a request for sensitive information. By recognizing …

  6. | General phishing attack process. | Download Scientific Diagram

    Figure 1 depicts the general process flow for a phishing attack that contains four phases; these phases are elaborated in Proposed Phishing Anatomy. However, as shown in Figure 1, in most...

  7. Spam detection in SMS messages - Towards Data Science

    Dec 20, 2021 · Spam is unsolicited and unwanted messages sent electronically and whose content may be malicious. Email spam is sent/received over the Internet while SMS spam is …

  8. What is Smishing: Understanding SMS Security - Buzz Cybersecurity

    Jul 18, 2024 · Smishing, a portmanteau of “SMS” and “phishing,” refers to a type of cyber attack where malicious actors use text messages to deceive recipients into divulging sensitive …

  9. Learn more about text scams at ftc.gov/textscams. The FTC uses reports from the public to investigate and stop fraud, for consumer education and outreach, and for analyses like this.

  10. Data Protection [classic] - Creately

    You can easily edit this template using Creately. You can export it in multiple formats like JPEG, PNG and SVG and easily add it to Word documents, Powerpoint (PPT) presentations, Excel or …

Refresh