{"id":21351,"date":"2020-01-28T15:30:13","date_gmt":"2020-01-28T15:30:13","guid":{"rendered":"https:\/\/www.arimetrics.com\/glosario-digital\/phishing"},"modified":"2026-05-11T22:58:38","modified_gmt":"2026-05-11T22:58:38","slug":"phishing","status":"publish","type":"encyclopedia","link":"https:\/\/www.arimetrics.com\/en\/digital-glossary\/phishing","title":{"rendered":"Phishing"},"content":{"rendered":"<p><img decoding=\"async\" class=\"boxpad wp-image-14750 size-full alignright\" src=\"https:\/\/www.arimetrics.com\/wp-content\/uploads\/2020\/01\/Phishing-1.png\" alt=\"Phishing\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.arimetrics.com\/wp-content\/uploads\/2020\/01\/Phishing-1.png 300w, https:\/\/www.arimetrics.com\/wp-content\/uploads\/2020\/01\/Phishing-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>Definition:<\/strong><\/p>\n<p><em><strong>Phishing<\/strong><\/em><\/p>\n<p>is a type of cyber attack that is generally used to steal user data, including login credentials. This attack occurs when an attacker impersonates a trusted entity to trick the user into opening a deceptive email, text message or other form of communication.<\/p>\n\n<h2>What phishing is used for<\/h2>\n<p>Phishing is a fraudulent activity whose main objective is to induce the victim to click on a malicious link. This often results in the automatic installation of <a href=\"https:\/\/www.arimetrics.com\/en\/digital-glossary\/malware\">malware<\/a> on the user&#8217;s device. The most common type of phishing is email phishing, known as deceptive phishing or deceptive phishing. However, there are other types of phishing attacks.<\/p>\n<h2>Types of phishing<\/h2>\n<p>Some of the most common types of phishing are described below:<\/p>\n<ul>\n<li><strong>Deceptive Phishing:<\/strong> Attackers send emails that appear to be from legitimate sources to trick users into revealing personal or financial information.<\/li>\n<li><strong>Pharming or DNS-based phishing:<\/strong> Manipulation of host files or <a href=\"https:\/\/www.arimetrics.com\/en\/digital-glossary\/dns\">DNS<\/a> servers to redirect users to fake websites.<\/li>\n<li><strong>Search engine phishing:<\/strong> Creation of fake websites that are indexed by <a href=\"https:\/\/www.arimetrics.com\/en\/digital-glossary\/search-engine\">search engines<\/a> to redirect users to fraudulent pages.<\/li>\n<li><strong>Content injection phishing:<\/strong> Manipulation of a legitimate website by adding fake content to obtain confidential information.<\/li>\n<li><strong>Spear Phishing:<\/strong> Attacks targeted at specific individuals or companies, with personalized messages to increase the probability of success.<\/li>\n<li><strong>Whaling:<\/strong> Sophisticated attacks targeting senior executives or high-profile individuals within an organization.<\/li>\n<li><strong>Smishing and Vishing:<\/strong> Use of text messages (SMS) and voice calls to deceive victims and obtain personal information.<\/li>\n<\/ul>\n<h2>Consequences of phishing<\/h2>\n<p>Phishing can have several negative consequences, such as:<\/p>\n<ul>\n<li><strong>Identity theft:<\/strong> Attackers can use stolen personal information to impersonate the victim.<\/li>\n<li><strong>Financial losses:<\/strong> Victims may face money losses if attackers access bank accounts or credit cards.<\/li>\n<li><strong>Compromise of confidential data:<\/strong> Companies can have sensitive data compromised, affecting the privacy and trust of customers.<\/li>\n<li><strong>Disruption of operations:<\/strong> Attacks can cause downtime and loss of productivity.<\/li>\n<\/ul>\n<h2>Phishing protection measures<\/h2>\n<p>To protect yourself against phishing it is advisable to implement the following measures:<\/p>\n<ul>\n<li><strong>Education and awareness:<\/strong> Train users to identify suspicious emails and messages.<\/li>\n<li><strong>Use of security software:<\/strong> Implement cybersecurity solutions to detect and block phishing attempts.<\/li>\n<li><strong>Two-factor authentication (2FA):<\/strong> Add an additional layer of security to make unauthorized access more difficult.<\/li>\n<li><strong>Verification of URLs:<\/strong> Check that <a href=\"https:\/\/www.arimetrics.com\/en\/digital-glossary\/url\">URLs<\/a> are correct and secure before entering sensitive information.<\/li>\n<li><strong>Software update:<\/strong> Keep systems and applications updated with the latest security patches.<\/li>\n<\/ul>\n<h2>Frequently asked questions about Phishing<\/h2>\n<div class=\"geo-faq-block\">\n<details class=\"geo-faq-item\">\n<summary>What does Phishing mean in digital marketing?<\/summary>\n<p>Phishing refers to the concept described in this glossary entry: Definition: Phishing is a type of cyber attack that is generally used to steal user data, including login credentials.  What phishing is used for Phishing is a fraudulent activity whose main objective is to induce the victim to click on a malicious link. It gives teams a shared vocabulary for analysing digital projects.<\/p>\n<\/details>\n<details class=\"geo-faq-item\">\n<summary>When should teams pay attention to Phishing?<\/summary>\n<p>Teams should review Phishing when it affects acquisition, measurement, user experience, content, automation or campaign performance. The important step is to connect the definition with a real decision.<\/p>\n<\/details>\n<details class=\"geo-faq-item\">\n<summary>How is Phishing used in a digital strategy?<\/summary>\n<p>Phishing is used by translating the concept into practical checks: where it appears in the funnel, which data or channel is involved and whether it needs optimisation, monitoring or documentation.<\/p>\n<\/details>\n<details class=\"geo-faq-item\">\n<summary>What is a common mistake when interpreting Phishing?<\/summary>\n<p>A common mistake is using Phishing too broadly. It is better to verify the context, the tool or the metric involved before making strategic or technical conclusions.<\/p>\n<\/details>\n<\/div>\n<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@graph\": [\n    {\n      \"@type\": \"DefinedTerm\",\n      \"@id\": \"https:\/\/www.arimetrics.com\/en\/digital-glossary\/phishing#definedterm\",\n      \"name\": \"Phishing\",\n      \"description\": \"Definition of Phishing in the Arimetrics Digital Glossary.\",\n      \"inDefinedTermSet\": {\n        \"@type\": \"DefinedTermSet\",\n        \"name\": \"Arimetrics Digital Glossary\",\n        \"url\": \"https:\/\/www.arimetrics.com\/en\/digital-glossary\"\n      }\n    },\n    {\n      \"@type\": \"FAQPage\",\n      \"@id\": \"https:\/\/www.arimetrics.com\/en\/digital-glossary\/phishing#faq\",\n      \"mainEntity\": [\n        {\n          \"@type\": \"Question\",\n          \"name\": \"What does Phishing mean in digital marketing?\",\n          \"acceptedAnswer\": {\n            \"@type\": \"Answer\",\n            \"text\": \"Phishing refers to the concept described in this glossary entry: Definition: Phishing is a type of cyber attack that is generally used to steal user data, including login credentials.  What phishing is used for Phishing is a fraudulent activity whose main objective is to induce the victim to click on a malicious link. It gives teams a shared vocabulary for analysing digital projects.\"\n          }\n        },\n        {\n          \"@type\": \"Question\",\n          \"name\": \"When should teams pay attention to Phishing?\",\n          \"acceptedAnswer\": {\n            \"@type\": \"Answer\",\n            \"text\": \"Teams should review Phishing when it affects acquisition, measurement, user experience, content, automation or campaign performance. The important step is to connect the definition with a real decision.\"\n          }\n        },\n        {\n          \"@type\": \"Question\",\n          \"name\": \"How is Phishing used in a digital strategy?\",\n          \"acceptedAnswer\": {\n            \"@type\": \"Answer\",\n            \"text\": \"Phishing is used by translating the concept into practical checks: where it appears in the funnel, which data or channel is involved and whether it needs optimisation, monitoring or documentation.\"\n          }\n        },\n        {\n          \"@type\": \"Question\",\n          \"name\": \"What is a common mistake when interpreting Phishing?\",\n          \"acceptedAnswer\": {\n            \"@type\": \"Answer\",\n            \"text\": \"A common mistake is using Phishing too broadly. It is better to verify the context, the tool or the metric involved before making strategic or technical conclusions.\"\n          }\n        }\n      ]\n    }\n  ]\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Definition: Phishing is a type of cyber attack that is generally used to steal user data, including login credentials. This attack occurs when an attacker impersonates a trusted entity to trick the user into opening a deceptive email, text message or other form of communication. What phishing is used for Phishing is a fraudulent activity [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"template":"","encyclopedia-tag":[963],"class_list":["post-21351","encyclopedia","type-encyclopedia","status-publish","hentry","encyclopedia-tag-seguridad-digital"],"_links":{"self":[{"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/encyclopedia\/21351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/encyclopedia"}],"about":[{"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/types\/encyclopedia"}],"author":[{"embeddable":true,"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/users\/6"}],"wp:attachment":[{"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/media?parent=21351"}],"wp:term":[{"taxonomy":"encyclopedia-tag","embeddable":true,"href":"https:\/\/www.arimetrics.com\/en\/wp-json\/wp\/v2\/encyclopedia-tag?post=21351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}