Abstract:
Clone phishing is a type of cyberattack in which perpetrators build a false website or email that closely mimics a real website or email from a reliable source in an effort to coerce consumers into disclosing important information. The tactics, examples, and effects of clone phishing assaults on people and organizations are all covered in this study. The article also examines defenses against clone phishing attempts, including user education, two-factor authentication, anti-phishing software, website verification, email authentication, and routine software upgrades.
Reference this Research Paper (copy & paste below code):
Ayan Chaudhuri
(2023); Clone Phishing: Attacks and Defenses; International Journal of Scientific and Research Publications (IJSRP)
13(04) (ISSN: 2250-3153), DOI: http://dx.doi.org/10.29322/IJSRP.13.04.2023.p13626