Phishing terms, explained simply

A plain-English reference for the words you keep seeing in security blogs. Real examples, no jargon, no marketing.

Phishing
Read →

Fraudulent attempt to steal credentials or money by impersonating a trusted entity, usually via email or a fake website.

Spear phishing
Read →

Targeted phishing aimed at a specific person or organization, often using personal information gathered beforehand.

Smishing (SMS phishing)
Read →

Phishing delivered via SMS text message. Mobile-targeted attacks that exploit the trust placed in text messages.

Vishing (voice phishing)
Read →

Phishing carried out over a phone call, often using spoofed caller ID and urgency tactics.

Quishing (QR phishing)
Read →

Phishing that uses a QR code to deliver a malicious URL — bypasses many corporate URL filters.

Typosquatting
Read →

Registering domain names that look like a known brand to catch users who mistype or skim. The infrastructure layer of phishing.

Homoglyph attack
Read →

Replacing a character in a domain with a visually identical one (often a Unicode lookalike) so the URL passes a glance test.

IDN homograph (Punycode)
Read →

Internationalized Domain Names that use non-ASCII characters to spoof brand names.

Business Email Compromise (BEC)
Read →

Targeted phishing aimed at corporate finance teams to redirect wire transfers or invoice payments.

Credential harvesting
Read →

The capture stage of a phishing attack — a fake login page that records whatever the victim types.

Google Safe Browsing
Read →

Google's real-time blocklist of phishing and malware URLs. The most widely deployed URL-reputation feed in the world.

VirusTotal
Read →

URL/file scanning service that aggregates verdicts from 70+ antivirus engines and threat-intel feeds.

URLhaus (abuse.ch)
Read →

Public malware URL database curated by the abuse.ch research team.

DMARC / SPF / DKIM
Read →

The three email-authentication standards that prove an email actually came from the domain it claims.

Adversary-in-the-Middle (AiTM)
Read →

A modern phishing kit that proxies traffic in real time between victim and the real service — defeating MFA.