answersLogoWhite

0

It is unclear who first created phishing, as social engineering attacks have been around for many years. A phishing technique was first described in a paper and presentation delivered to the 1987 International HP Users Group, Interex. The exact term phishing was first used in a hacking tool known as AOHell, released in 1994 by "hackers" known as Da Chronic, The Rizzer, and The Squirrel.

On the funny side:

"Actually I created the term phishing, then my wife came out and hollered at me to go out and find a job. But the problem is they were biting really good." -- Anonymous Answers contributor.

User Avatar

Wiki User

9y ago

What else can I help you with?

Related Questions

What specific country the phishing started?

There probably is no one particular country where phishing started. Since phishing is essentially a form of "social engineering" and people have been running cons and scams throughout recorded history, it is likely that the first phishing sprang up in multiple places independently and roughly simultaneously with the creation of email. The first "phishers" were probably from countries with fairly good computer infrastructures when email was first created. Phishing occurred even before the first recorded use of the term around 1996. As an example, warez community members on AOL were using AOHell as early as 1994 to steal credit card numbers to use to pay for AOL accounts.


What are consequences of phishing?

The consequences of phishing can be severe for both individuals and organizations: Data theft – Attackers can steal sensitive information like login credentials, financial details, or personal data. Financial loss – Victims may face unauthorized transactions, business email compromise (BEC) scams, or direct theft. Malware infections – Clicking malicious links can install ransomware, spyware, or other harmful software. Reputation damage – Businesses may lose customer trust and face long-term brand harm. Legal and regulatory penalties – Organizations may face heavy fines for data breaches caused by phishing, especially under GDPR, HIPAA, or other compliance frameworks. Operational disruption – Ransomware or credential compromise can halt business operations. How to prevent phishing: Enable email filtering and anti-phishing tools. Deploy Secure Web Gateway solutions like Veltar to block malicious URLs and phishing domains in real time. Implement Multi-Factor Authentication (MFA) to limit damage from stolen credentials. Use Endpoint Detection & Response (EDR) and regular software updates. Run security awareness training to help employees spot phishing attempts.


How many pages does The Phishing Manual have?

The Phishing Manual has 320 pages.


Can you start a sentence with the word phishing?

can you start a sentence using the word phishing?


When was The Phishing Manual created?

The Phishing Manual was created on 1996-12-12.


How you can do phishing?

You know that phishing is illegal and counts as a felony right? But whatever, phishing is the act of redirecting a browser to a fake website where it asks for confindential information.


How does Spear phishing differ from phishing?

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.Spear Phishing is the same as Phishing. The difference is that the attack is targeted towards a specific person or group.Whaling is the same thing as Spear Phishing. The difference is that the specific target is high-value, such as company CEOs, CFOs, etc.


Why is phishing bad?

Phishing is bad. Phishing schemes are ways for unscrupulous people to gain access to personal information about people. They can then use this information for unethical reasons.


What is the ISBN of The Phishing Manual?

The ISBN of The Phishing Manual is 0-7868-8203-4.


Is phishing email considered spam?

Not all spam is phishing, but phishing emails can be considered a type of spam. Spam is usually unwanted bulk email, while phishing specifically tries to trick you into sharing sensitive information.


What is a spear phishing?

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.Spear Phishing is the same as Phishing. The difference is that the attack is targeted towards a specific person or group.Whaling is the same thing as Spear Phishing. The difference is that the specific target is high-value, such as company CEOs, CFOs, etc.


Theo receives an email from his bank while at work The email emphatically states that he must?

Phishing

Trending Questions
What lien do I file on someone declaring chapter 11? Is pooping your pants illegal? When do you leave for maternity leave? What is characteristic of law? What is The Wanderer's copyright date? What are the potential risks associated with unmoderated user-generated content (UGC)? In ohms law formula the letter E stands for? How do American citizens today let there government know about there grievances? Many illegal aliens pay taxes aren't they considered taxpayers too? How to create a legal business in compliance with all regulations and laws? For unwed parents how easy is it for the mother to get sole custody of her child when the father owes about 30000 grand in back child support for 2 other children from 2 previous marriages? How can you check the landlord deed? What do you do if you are living with a married man but he is still debating if he wants you or his wife? The will states all deceased's children must agree on everything before six months is up. What rights do you have if the executrix is going ahead and not involving other children? Who set up sonny? How has the patriot act affected airports and airlines? Who was the United States President who tried to buy land from Mexico? Can the mother of a 2 month old baby keep the father from seeing the child if they have never been married when the father wants to support and help with care? What are the potential consequences of a defendant's waiver of rights? Whose demads for equal representation did the senate satisfy?