Phishing is a type of attack on computer device. In phishing, attacker tries to find the sensitive information of users by the means of electronic communication illegally. In other words, it is the illegal attempt to obtain secure information of the people or the users.
Simple example of phishing is bank fraud, where hackers tried get your bank details through communication by acting as an employee of the bank that is a fraud manner.
Pharming is a more advance technique to get users credentials by making effort to entering users into the website. In order words, it misdirects users to a fake website that appears to be official and victims gives their personal information by fault.
In pharming, fake website is created which appears to be official. Users then access the website and request is popped up regarding username and password and other credentials.
Let’s see the difference between Phishing and Pharming:
|1||In phishing, attacker tries to find the sensitive information of users by the means of electronic communication illegally.||Pharming is a more advance technique to get users credentials by making effort to entering users into the website.|
|2||It is an attempt to scam people one at a time via an email or instant message./td>||It simply redirects traffic from one website to a different, identical-looking website to steal information.|
|3||It is an electronic mail fraud.||It is similar to nature to email phishing.|
|4||It is a type of fraud in which an attacker tricks the victims into providing providing personal information by email or message.||It is a scam and seeks to obtain personal and private information through domain spoofing.|
|5||It is relatively easy to initiate and identify.||It is more difficult to accomplish and identify.|
|6||It involves a fraudulent email containing a link to a website seeking personal details from users.||It poisons the DNS server, redirecting the users to a different websites.|
|7||It uses mail.||It uses websites.|
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Difference between Spoofing and Phishing
- Difference between Spear Phishing and Whaling
- Difference between Spam and Phishing Mail
- Vishing (Voice Phishing)
- Phishing in Ethical Hacking
- Difference between USB 2.0 and USB 3.0
- Difference Between SMO and SEO
- Difference between PCI and PCI-X
- Difference between PCI-E and PCI-X
- Difference between IoT and M2M
- Difference between CD and DVD
- Difference between Tor and VPN
- Difference between PIP and PCP
- Difference between LAN, MAN and WAN
- Difference between CD-R and CD-RW
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.