Glossary of Phishing Terms

Phishing

A cyberattack where criminal impersonate trusted entitles (like banks or retailers) to trick people into revealing sensitive data such as passwords, credit card numbers, or personal information.

Social engineering

Manipulative tactics that exploit human psychology–such as urgency, fear, or curiousity–to deceive individuals into compromising security.

Email phishing

The most common phishing method. Attackers send fraudulent emails that look like official communications to trick recipients into clicking malicious links or sharing sensitive information.

Spear phishing

A highly targeted phishing attack aimed at a specific person or organization. Often uses personal details (from social media or data breaches) to make the message more convincing.

Whaling

A type of spear phishing that targets high-profile individuals, such as executives or government officials, with the goals of stealing valuable data or funds.

Business email compromise (BEC)

A phishing-based scam where attackers impersonate executives, vendors, or partners to trick businesses into transferring money or sensitive information. 

Smishing

Phishing delivered via SMS text messages. Attackers spoof pohne numbers to make messages look like they’re from banks or service providers.

Vishing

Phishing conducted over the phone (“voice phishing”). Attackers may impersonate customer service agents, banks, or government officials to extract personal information.

Clone phishing

A phishing technique where attackers copy a legitimate email, swap out links or attachments for malicious ones, and resend it to the victim.

AI-enhanced phishing

Phishing that uses artificial intelligence (AI) to create more convincing messages, deepfake voices, or videos that closely mimic real communications.

Deepfake vishing

An advanced form of vishing where attackers use AI-generated voices or video to impersonate trusted individuals.

Bait

The fraudulent message, email, or link designed to lure victims into engaging with a phishing attempt.

Exploitation

The final stage of phishing attack, when stolen information is used for fraud, identity theft, ransomware deployment, or other malicious activity.

Malware

Malicious software (such as ransomware, spyware, or keyloggers) that can be installed on a device through phishing links or attachments.

Ransomware

A type of malware that encrypts a victim’s files and demands payment (a ransom) for restoring access.

Data breach

An incident where sensitive, confidential, or protected data is accessed or stolen. Phishing is one of the leading causes of breaches worldwide.

Identity theft

When stolen personal information is used to impersonate someone else for fraudulent purposes, such as opening bank accounts or making unauthorized purchases.

Urgency cue

A psychological manipulation tactic in phishing messages that pressures recipients to act immediately, often to “secure an account” or “prevent suspension.”

IC3 (Internet Crime Compliant Center)

A division of the FBI that collects reports of cybercrime, including phishing attacks.

APWG (Anti-Phishing Working Group)

An international coalition that tracks phishing trends and publishes reports on global activity.

Dark web marketplace

Online platforms where criminal sell stolen data, including login credentials and credit card numbers obtained through phishing.

Phishing prevention

Practices and tools used to reduce phishing risk, such as two-factor authentication (2FA), email filters, privacy apps (like MySudo), and ongoing user education.