{"id":10312,"date":"2023-04-06T14:05:06","date_gmt":"2023-04-06T14:05:06","guid":{"rendered":"https:\/\/fieldtrust.be\/?p=10312"},"modified":"2023-04-11T14:26:59","modified_gmt":"2023-04-11T14:26:59","slug":"types-of-phishing-attacks","status":"publish","type":"post","link":"https:\/\/fieldtrust.be\/fr\/types-of-phishing-attacks","title":{"rendered":"Types of Phishing Attacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10312\" class=\"elementor elementor-10312\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21760341 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21760341\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-268932c5\" data-id=\"268932c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54fc819 elementor-widget elementor-widget-text-editor\" data-id=\"54fc819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It\u2019s important to understand the different types of phishing attacks there are so you\u2019re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected.<\/p><p>Continue reading to learn more about the different types of phishing attacks and how you can keep yourself safe from them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43fa1079 elementor-widget elementor-widget-heading\" data-id=\"43fa1079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is a Phishing Attack?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5159b8ff elementor-widget elementor-widget-text-editor\" data-id=\"5159b8ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A phishing attack is a type of social engineering cyberattack that attempts to persuade the targeted victim into disclosing sensitive information. When people are not aware of phishing attacks, they tend to fall for them, which can result in the loss of sensitive personal information such as credentials, credit card numbers and more. Phishing attacks have become increasingly sophisticated over the years which can make them even harder to spot \u2013 but not impossible.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-177f1e21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"177f1e21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7a13e941\" data-id=\"7a13e941\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-977125e elementor-widget elementor-widget-heading\" data-id=\"977125e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">10 Types of Phishing Attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a1e6361 elementor-widget elementor-widget-text-editor\" data-id=\"4a1e6361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here are some types of phishing attacks you should know about.<\/p><h3 id=\"h-smishing\" class=\"wp-block-heading\">Smishing<\/h3><p><a href=\"https:\/\/www.keepersecurity.com\/threats\/smishing.html\">Smishing<\/a>, also known as SMS phishing, is when you receive a text message asking you to click on a link. The message can be worded as though it contains an offer for a free product or an urgent alert. The attacker may use personal information from their victim, in an attempt to convince them that the message is real so they will disclose sensitive data.\u00a0<\/p><h3 id=\"h-vishing\" class=\"wp-block-heading\">Vishing<\/h3><p>Vishing is similar to smishing, but it takes place through a phone call rather than a text message. Victims of vishing attacks are often more convinced because they\u2019re talking to another person on the other end of the phone. This can make the victim more likely to disclose sensitive information without second-guessing themselves.<\/p><h3 id=\"h-clone-phishing\" class=\"wp-block-heading\">Clone phishing<\/h3><p>Clone phishing is when an attacker clones an email from a legitimate company and resends it to their victim. However, the cloned email contains malicious links and\u00a0<a href=\"https:\/\/www.keepersecurity.com\/threats\/malware.html\">malware<\/a>\u00a0that will infect the victim\u2019s device if they click on them. This can place all of the victim\u2019s personal information at risk of becoming\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2023\/02\/02\/how-passwords-get-compromised\/\">compromised<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2022\/11\/29\/the-cost-of-stolen-credentials\/\">stolen<\/a>.\u00a0<\/p><h3 id=\"h-whaling\" class=\"wp-block-heading\">Whaling<\/h3><p>Whaling is a type of phishing attack which targets high-profile individuals rather than everyday people. An example of a high-profile person would be a CEO of a company. The goal of this type of attack is to gain access to high-level data or classified information.\u00a0<\/p><h3 id=\"h-pharming\" class=\"wp-block-heading\">Pharming<\/h3><p>Pharming is a type of phishing attack where the victim is redirected from a\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2023\/02\/21\/how-to-tell-if-a-website-is-legit\/\">legitimate site<\/a>\u00a0to a spoofed site, otherwise known as a fake site. The purpose of the redirect is to get the victim to enter their personal information in an attempt to steal it.\u00a0<\/p><h3 id=\"h-pop-up-phishing\" class=\"wp-block-heading\">Pop-up phishing<\/h3><p>Pop-up phishing is when a message pops up as an individual is surfing the web that tells the potential victim something is wrong with the security of their device. For example it could say something like \u201cWARNING! Your computer may have a virus.\u201d It\u2019ll then prompt you to scan your device, but doing this will infect your device with malware. Once the malware is installed, attackers can steal your data or prevent you from accessing your files, depending on the type of malware installed.\u00a0<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/1.https-example.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-10206\" src=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/1.https-example.png\" sizes=\"(max-width: 528px) 100vw, 528px\" srcset=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/1.https-example.png 704w, https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/1.https-example-300x164.png 300w\" alt=\"Example of a pop-up phishing attack. \" width=\"528\" height=\"288\" \/><\/a><\/figure><\/div><h3 id=\"h-spear-phishing\" class=\"wp-block-heading\">Spear phishing<\/h3><p>With spear phishing, an attacker must have prior information about their victim such as their full name, phone number, address and so on. Spear phishing can take place through email, text messages or phone calls. During this type of attack, the victim is easily convinced because the attacker has information about them that makes them sound legitimate and trustworthy.\u00a0<\/p><h3 id=\"h-evil-twin-phishing\" class=\"wp-block-heading\">Evil twin phishing<\/h3><p>Evil twin phishing is when an attacker sets up a fake Wi-Fi access point. Instead of clicking on a legitimate WiFi network, victims will click on the fake one and once they do, everything they share over the network is passed through a server that is controlled by the attacker. The attacker will be able to see everything they do, including when they log into their accounts and enter sensitive information such as credit card numbers. This type of attack is more likely to occur when the victim is trying to access a\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2022\/09\/29\/why-you-should-avoid-public-wifi\/\">public WiFi network<\/a>.\u00a0<\/p><h3 id=\"h-angler-phishing\" class=\"wp-block-heading\">Angler phishing<\/h3><p>Angler phishing is when an attacker poses as a Customer Service Representative (CSR) in an attempt to convince the victim to disclose their personal information. Since the victim believes it\u2019s a legitimate CSR, they give out their information with no hesitation.\u00a0<\/p><h3 id=\"h-https-phishing\" class=\"wp-block-heading\">HTTPS phishing<\/h3><p>HTTPS phishing is when an attacker creates a spoofed site that uses the Hypertext Transfer Protocol Secure (HTTPS). Most sites have HTTPS on the URL bar where it appears as a lock icon. HTTPS is a standard protocol which is meant to ensure that a site\u2019s connection is secure because it encrypts traffic between a browser and a site. However, many attackers have been abusing HTTPS to get victims to trust\u00a0 spoofed sites. Spoofed sites are not secure, but a fake HTTPS makes it look like they are. Because of this, victims are more likely to enter their information into the spoofed site.\u00a0<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/2.popup-example.png\"><img decoding=\"async\" class=\"wp-image-10207\" src=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/2.popup-example.png\" sizes=\"(max-width: 595px) 100vw, 595px\" srcset=\"https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/2.popup-example.png 793w, https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/2.popup-example-300x53.png 300w, https:\/\/www.keepersecurity.com\/blog\/wp-content\/uploads\/2023\/04\/2.popup-example-768x135.png 768w\" alt=\"Example of HTTPS phishing using a spoofed URL.\" width=\"595\" height=\"104\" \/><\/a><\/figure><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1a9d119 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a9d119\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-945431e\" data-id=\"945431e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0252091 elementor-widget elementor-widget-heading\" data-id=\"0252091\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecting Yourself From Phishing Attacks\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8f4fd elementor-widget elementor-widget-text-editor\" data-id=\"7b8f4fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now that you know some of the most common types of phishing attacks, here are some of the ways you can\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2022\/10\/07\/5-ways-to-protect-yourself-from-a-phishing-attack\/\">protect yourself<\/a>\u00a0from falling victim to them.\u00a0<\/p><h3 id=\"h-stay-informed-about-the-latest-phishing-threats\" class=\"wp-block-heading\">Stay informed about the latest phishing threats<\/h3><p>One of the most important ways you can protect yourself from phishing attacks is by knowing what they are and keeping up to date on the latest phishing scams that are making headlines. Phishing scams are more likely to occur during big events like\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2023\/02\/17\/how-to-stay-safe-online-during-tax-season\/\">tax season<\/a>, which is often when attackers will pose as the IRS. Being vigilant about the latest phishing scams can make all the difference in keeping yourself and your information safe.\u00a0<\/p><h3 id=\"h-don-t-click-on-unsolicited-links-or-attachments\" class=\"wp-block-heading\">Don\u2019t click on unsolicited links or attachments<\/h3><p>Always remember that you should not click on any links or attachments that you receive unsolicited, especially from people you do not know. As an extra precaution, before clicking on links,\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2023\/02\/09\/how-to-check-if-a-link-is-safe\/\">check to see if they\u2019re safe<\/a>. One way you can do this is by hovering your mouse over the link to check if the URL looks \u201cphishy.\u201d You can also use a URL checker like the\u00a0<a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/search?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Google Transparency Report<\/a>\u00a0to ensure that the URL is safe to click. If it\u2019s not, make sure you report it to the company the attacker is impersonating so they can warn other customers.\u00a0<\/p><h3 id=\"h-make-sure-you-have-mfa-on-your-accounts\" class=\"wp-block-heading\">Make sure you have MFA on your accounts<\/h3><p>If you were to fall victim to a phishing attack and the attacker gets away with your credentials, having\u00a0<a href=\"https:\/\/www.keepersecurity.com\/resources\/glossary\/what-is-multi-factor-authentication\/\">Multi-Factor Authentication (MFA)<\/a>\u00a0helps prevent your accounts from being fully compromised.\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2022\/12\/20\/the-benefits-of-multi-factor-authentication\/\">MFA<\/a>\u00a0adds one or more authentication methods in addition to your username and password. So even if the attacker knows your login credentials, they still wouldn\u2019t be able to log in to your accounts without that additional verification.\u00a0<\/p><h3 id=\"h-don-t-respond-to-anyone-who-asks-you-to-reveal-personal-information\" class=\"wp-block-heading\">Don\u2019t respond to anyone who asks you to reveal personal information<\/h3><p>Anyone you don\u2019t know or haven\u2019t reached out to who asks you for your sensitive and personal information should be a red flag. While most phishing attacks use scare tactics as a way to get a victim to reveal their information, it\u2019s important that you stand your ground by not falling for them. Unless you personally reach out to a company, a legitimate company will never ask you to disclose sensitive information.\u00a0<\/p><h3 id=\"h-back-up-your-sensitive-data-and-information\" class=\"wp-block-heading\">Back up your sensitive data and information<\/h3><p>Many phishing attacks can result in your device being infected with malware. Certain types of malware such as ransomware may prevent you from being able to access your files, so it\u2019s important that you always have your personal data backed up in a secure location. The best way you can do this is by storing your information in a\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2022\/06\/19\/what-is-a-password-manager\/\">password manager<\/a>\u00a0that offers file storage. Keeper Password Manager offers an add-on called\u00a0<a href=\"https:\/\/www.keepersecurity.com\/consumer-secure-file-storage.html\">Stockage s\u00e9curis\u00e9 des fichiers<\/a>\u00a0which allows you to store many different types of files and securely access them from anywhere. There\u2019s no need to worry about losing access to your files because they\u2019ll be backed up in an\u00a0<a href=\"https:\/\/www.keepersecurity.com\/blog\/2023\/02\/16\/what-is-encryption-how-it-works-and-its-benefits\/\">encrypted<\/a>\u00a0location.\u00a0<\/p><p>Source : Keepersecurity.com<\/p><div class=\"wp-block-image\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It\u2019s important to understand the different types of phishing attacks there are so you\u2019re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"1":"post","5":"has-post-thumbnail"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Types of Phishing Attacks &#8211; Fieldtrust<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Phishing Attacks &#8211; Fieldtrust\" \/>\n<meta property=\"og:description\" content=\"There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It\u2019s important to understand the different types of phishing attacks there are so you\u2019re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fieldtrust.be\/fr\/types-of-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Fieldtrust\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-06T14:05:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-11T14:26:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"fieldtrust_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:site\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"fieldtrust_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks\"},\"author\":{\"name\":\"fieldtrust_admin\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\"},\"headline\":\"Types of Phishing Attacks\",\"datePublished\":\"2023-04-06T14:05:06+00:00\",\"dateModified\":\"2023-04-11T14:26:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks\"},\"wordCount\":1353,\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper-Belgium.jpeg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks\",\"name\":\"Types of Phishing Attacks &#8211; Fieldtrust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper-Belgium.jpeg\",\"datePublished\":\"2023-04-06T14:05:06+00:00\",\"dateModified\":\"2023-04-11T14:26:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#primaryimage\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper-Belgium.jpeg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Keeper-Belgium.jpeg\",\"width\":800,\"height\":418},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/types-of-phishing-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fieldtrust.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Types of Phishing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"name\":\"Fieldtrust\",\"description\":\"The Value-Added Distributor for MSPs\",\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fieldtrust.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\",\"name\":\"Fieldtrust\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"width\":1,\"height\":1,\"caption\":\"Fieldtrust\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/fieldtrustbnl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fieldtrust\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCchBwXtTmebI8KkdOGrcC5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\",\"name\":\"fieldtrust_admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Types of Phishing Attacks &#8211; Fieldtrust","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"fr_FR","og_type":"article","og_title":"Types of Phishing Attacks &#8211; Fieldtrust","og_description":"There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It\u2019s important to understand the different types of phishing attacks there are so you\u2019re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about [&hellip;]","og_url":"https:\/\/fieldtrust.be\/fr\/types-of-phishing-attacks\/","og_site_name":"Fieldtrust","article_published_time":"2023-04-06T14:05:06+00:00","article_modified_time":"2023-04-11T14:26:59+00:00","og_image":[{"width":800,"height":418,"url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg","type":"image\/jpeg"}],"author":"fieldtrust_admin","twitter_card":"summary_large_image","twitter_creator":"@fieldtrustbnl","twitter_site":"@fieldtrustbnl","twitter_misc":{"\u00c9crit par":"fieldtrust_admin","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#article","isPartOf":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks"},"author":{"name":"fieldtrust_admin","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd"},"headline":"Types of Phishing Attacks","datePublished":"2023-04-06T14:05:06+00:00","dateModified":"2023-04-11T14:26:59+00:00","mainEntityOfPage":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks"},"wordCount":1353,"publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"image":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg","articleSection":["Uncategorized"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks","url":"https:\/\/fieldtrust.be\/types-of-phishing-attacks","name":"Types of Phishing Attacks &#8211; Fieldtrust","isPartOf":{"@id":"https:\/\/fieldtrust.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#primaryimage"},"image":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg","datePublished":"2023-04-06T14:05:06+00:00","dateModified":"2023-04-11T14:26:59+00:00","breadcrumb":{"@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fieldtrust.be\/types-of-phishing-attacks"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#primaryimage","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2023\/04\/Keeper-Belgium.jpeg","width":800,"height":418},{"@type":"BreadcrumbList","@id":"https:\/\/fieldtrust.be\/types-of-phishing-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fieldtrust.be\/"},{"@type":"ListItem","position":2,"name":"Types of Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/fieldtrust.be\/#website","url":"https:\/\/fieldtrust.be\/","name":"Fieldtrust","description":"The Value-Added Distributor for MSPs","publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fieldtrust.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fieldtrust.be\/#organization","name":"Fieldtrust","url":"https:\/\/fieldtrust.be\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","width":1,"height":1,"caption":"Fieldtrust"},"image":{"@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/fieldtrustbnl","https:\/\/www.linkedin.com\/company\/fieldtrust\/","https:\/\/www.youtube.com\/channel\/UCchBwXtTmebI8KkdOGrcC5w"]},{"@type":"Person","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd","name":"fieldtrust_admin"}]}},"_links":{"self":[{"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/posts\/10312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/comments?post=10312"}],"version-history":[{"count":8,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/posts\/10312\/revisions"}],"predecessor-version":[{"id":10321,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/posts\/10312\/revisions\/10321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/media\/10317"}],"wp:attachment":[{"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/media?parent=10312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/categories?post=10312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fieldtrust.be\/fr\/wp-json\/wp\/v2\/tags?post=10312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}