Spam (also known as junk mail) is unsolicited email. In most cases, spam is a method of advertising. However, spam can send harmful links, malware or deceptive content. The end goal is to obtain sensitive information such as a social security number or bank account information. Most spam comes from multiple computers on networks infected by a virus or worm. These compromised computers send out as much bulk email as possible.
Phishing is a form of fraud. Cyber criminals use email, instant messaging, or other social media to try to gather information such as login credentials by masquerading as a reputable person. Phishing occurs when a malicious party sends a fraudulent email disguised as being from an authorized, trusted source. The message intent is to trick the recipient into installing malware on his or her device or into sharing personal or financial information.
Lets see the Difference Between Spam and Phishing Mail:
|S.NO||SPAM MAIL||PHISHING MAIL|
|1||Spam emails is referred to as junk email and is unsolicited messages sent in bulk by email.||Phishing emails are fraudulent emails designed to steal users private information and data.|
|2||Spam emails are a form of commercial advertising designed to flood the email inbox of users.||Phishing is a social engineering attack on the mail and often carried out via emails with the intention of obtaining sensitive information|
|3||Spam is basically junk email flooding the inbox.||Phishing is not just limited to emails|
|4||Spam emails utilize commercial content.||Phishing emails utilize strong social engineering techniques.|
|5||It is an electronic equivalent of unsolicited email.||It is an equivalent of act of illicitly obtain users information|
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Difference between Spoofing and Phishing
- Difference between Phishing and Pharming
- Difference between Spear Phishing and Whaling
- Phishing in Ethical Hacking
- Vishing (Voice Phishing)
- Privacy Enhanced Mail (PEM) and it's Working
- Simple Mail Transfer Protocol (SMTP)
- Multipurpose Internet Mail Extension (MIME) Protocol
- Difference between CD-R and CD-RW
- Difference between RPC and RMI
- Difference Between Gi-Fi and Li-Fi
- Difference between ZIP and RAR
- Difference between CLI and GUI
- Difference between PCA VS t-SNE
- Difference between JSP and ASP
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.