Phishing emails: They are designed to look like official communication from legitimate sources. They often ask users to provide confidential information or to click on suspicious links.
Domain hijacking or Pharming: This technique tries to redirect users to fraudulent websites that look like those of legitimate institutions. Victims are prompted to provide their personal information, which is then used for malicious purposes.
Phishing via text or voice message – Smishing and Vishing: Text messages or phone calls are used to trick victims and obtain their sensitive information.