{"id":3140,"date":"2019-04-06T19:34:22","date_gmt":"2019-04-06T19:34:22","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=3140"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"What-is-the-Difference-Between-Phishing-and-Malware-Scams?","status":"publish","type":"post","link":"http:\/\/www.syyhoaxanalyzer.com\/?p=3140","title":{"rendered":"What is the Difference Between Phishing and Malware Scams?"},"content":{"rendered":"<div>\n<div class=\"example\">\n<h1 class=\"title\">Question from reader:<\/h1>\n<div class=\"indentPara\">I know that many people get scammed by phishing and malware. But what are the differences between these two scam types. Or are they essentially the same thing? \u00a0 <\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<\/div>\n<\/div>\n<h2 class=\"adjustPad\">Answer:<\/h2>\n<div class=\"indentPara\">Phishing and malware attacks use quite different tactics although both have the goal of stealing your personal and financial information and\/or gaining access to your accounts.<\/div>\n<p>&nbsp;<\/p>\n<h4 class=\"adjustPad\">Phishing scams<\/h4>\n<div class=\"indentPara\">In a phishing attack, the scammers want you to click a link or open an attached file and supply personal information such as account login credentials and credit card details. Typically, you will be taken to a fake website that is designed to emulate a genuine bank or company webpage and asked to supply your details.<\/p>\n<p>The criminals will then use this information to hijack your account and conduct fraudulent activities. They may:<\/p>\n<ul>\n<li>Steal your money<\/li>\n<li>Conduct banking or credit card fraud<\/li>\n<li>Steal your identity<\/li>\n<li>Use your accounts to launch further scam and spam campaigns<\/li>\n<\/ul>\n<\/div>\n<h4 class=\"adjustPad\">Malware Scams<\/h4>\n<div class=\"indentPara\">Malware is short for &#8216;malicious software&#8217;. \u00a0 As with phishing, malware messages typically try to trick you into clicking links or opening attached files.<\/p>\n<p>However, instead of asking you to provide your personal information directly, clicking the link or opening the attachment may install malicious software on your computer without your knowledge.<\/p>\n<p>Typically, this malware can collect sensitive information such as passwords and usernames from your computer and send it to criminals. It may also download and install further malware.<\/p>\n<p>And, the malware may join your computer to a &#8216;botnet&#8217;.  \u00a0A botnet is a large collection of infected computers that criminals can control from afar. Botnets are often used to conduct spam and scam campaigns. For example, a botnet may be used to send phishing scam emails to hundreds of thousands of potential victims. <\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-format=\"fluid\"\n     data-ad-layout=\"in-article\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"9162856233\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<\/div>\n<div class=\"indentPara\">Thus, phishing and malware attacks are different but related tools in the online criminal&#8217;s toolkit.<\/p>\n<\/div>\n<h3 class=\"adjustPad\">Further Reading<\/h3>\n<section class=\"lateinfolist\">\n<ul>\n<li><a href=\"http:\/\/hoax-slayer.net\/phishing-scams-anti-phishing-information\/\">Phishing Scams &#8211; Anti-Phishing Information<\/a><\/li>\n<li><a href=\"http:\/\/hoax-slayer.net\/category\/malware\/\">Malware Threat Articles<\/a><\/li>\n<\/ul>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- Third Content Ad Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1909104632\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<div align=\"center\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block;\" data-ad-client=\"ca-pub-0355887770822260\" data-ad-slot=\"1358951439\" data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<\/section>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/difference-phishing-malware-scams\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/difference-phishing-malware-scams\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question from reader: I know that many people get scammed by phishing and malware. But what are the differences between these two scam types. Or are they essentially the same thing? \u00a0 Answer: Phishing and malware attacks use quite different tactics although both have the goal of stealing your personal and financial information and\/or gaining [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3140","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/3140"}],"collection":[{"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3140"}],"version-history":[{"count":0,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/3140\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3140"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}