59.1k views
0 votes
You receive an email that appears to be from eBay asking you to login to verify a transaction. This is an example of (a) __________ attack.

a. worm
b. virus
c. phishing
d. buyware

User Kaigorodov
by
8.2k points

1 Answer

5 votes

Final answer:

The email described is an example of a phishing attempt, a tactic where hackers impersonate legitimate entities to gain sensitive information, not to be confused with malware like worms or viruses.Option C is the correct answer.

Step-by-step explanation:

Receiving an email that appears to be from eBay asking you to login to verify a transaction is an example of a phishing attack. Hackers use phishing attempts to masquerade as legitimate institutions to lure individuals into providing sensitive data such as usernames, passwords, and credit card details. Unlike worms and viruses, which are types of malware, phishing doesn't necessarily involve a software threat but rather a social engineering technique. The term buyware is not commonly used in the context of cybersecurity threats and is not related to this type of attack.

Phishing attacks exploit deceptive emails, like those impersonating eBay, aiming to trick recipients into divulging sensitive information for fraudulent purposes. Perpetrators often mimic trustworthy entities, creating a false sense of urgency to prompt users to log in and verify transactions. Unlike traditional malware such as worms or viruses, phishing relies on social engineering rather than software threats. The term "buyware" lacks relevance in the cybersecurity lexicon and isn't associated with this deceptive tactic. Recognizing phishing cues, promoting cybersecurity awareness, and implementing multi-factor authentication are crucial defenses against such social engineering ploys, safeguarding users from inadvertent disclosure of confidential data and financial compromise.

User Ebrahim Pasbani
by
8.6k points