Skip to content
Related Articles

Related Articles

Difference between Phishing and Vishing

View Discussion
Improve Article
Save Article
  • Last Updated : 22 Jul, 2022
View Discussion
Improve Article
Save Article

There are several types of Email attacks that are used by the attackers to steal confidential information from users. The confidential information may include login credentials, bank card details, or any other sensitive data. Phishing and Vishing are also such types of attacks. 

1. Phishing : 

Phishing is a type of email attack in which the attacker tries to find the sensitive information of users in a fraud manner through electronic communication by intending to be from a related trusted organization. Attackers design emails carefully to target a group and clicking on the link installs malicious code on the computer. 

Example –

  • Stealing bank transaction passwords from users.
  • Stealing login credentials from users.

2. Vishing : 

Vishing is the type of cyber attack in which voice communication is used for stealing confidential data from a group of people. In vishing, the attacker tricks the target to give sensitive information through a voice call pretending to be an employee from a related and trusted firm. 

Example –

  • Asking for bank transaction OTP from users.
  • Asking for UPI PIN from users.

Difference between Phishing and Vishing :

S. No.PHISHINGVISHING
1.Phishing attack is targeted for a wide range of people through emails.A vishing attack is also targeted at a wide range of people through voice communication.
2.Victim needs to click on malicious links.Victim needs to tell the information on their own.
3.It is an automated attack.While it is a manual attack.
4.A single attacker can send various emails at a time.Voice calling to target can be done by a attacker one a time.
5.It has more accuracy.It has less accuracy.
6.It is more used now-a-days.It was mostly used in earlier days but still attackers use it.
7.The attackers involved in phishing are cyber criminals or professional hackers.While the vishing attackers are not experts in hacking.
8.

Phishing can take place in the following forms-

  • Spear Phishing
  • Whaling
  • Clone Phishing
  • Smishing
  • Vishing
  • Angler phishing and more.

Vishing can take place in the following forms-

  • A government official
  • Telemarketing Incident
  • Fraudulent Tech Support
  • Fake bank transactions and more.
9.

Common Precautionary Steps-

  • Think twice before submitting your sensitive information.
  • Never believe warning messages.
  • Avoid opening any Word, Excel, PowerPoint, or PDF-like enclosed documents in these deceptive or unusual communications and others.

Common Precautionary Steps-

  • Do not pick the call from unknown number
  • Block the number immediately in case you find something like fraud during the call.
  • Avoid responding such as pressing of buttons or speaking in response to prompts from automated message.
10.

Examples of Phishing Attacks-

  • Fraudulent fake invoices
  • Email Account Upgrade Fraud
  • Suspicious Activity Fraud and others.

Examples of Vishing Attacks-

  • Wardialing
  • Caller ID forgery
  • Dumpster diving and others.
My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!