Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

DEFINITION: Smishing

in Cyber101, Definition
1 min read

When the scam uses text messaging rather than a phone call or email, the scam technique is known as smishing. Typically, smishing text messages come from a “50000” number, instead of showing a typical phone number. This indicates that the message was sent from an email address, and not from an actual phone.

Tags: Definitionphishing-definitionsScamsSmishing
8
VIEWS

More Definitions

DEFINITION: Blockchain
Definition

DEFINITION: Hyperledger

February 27, 2021

Started by the Linux Foundation, hyperledger is an umbrella project of open source blockchains.

DEFINITION: Blockchain
Definition

DEFINITION: Ledger

February 26, 2021

An append only store of records

DEFINITION: Blockchain
Definition

DEFINITION: Distributed Ledger Technology (DLT)

February 25, 2021

DLT use independent computers (referred to as nodes) to record, share and synchronize transactions in their respective electronic ledgers (instead...

MORE

Book

Book: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers

January 25, 2021
Podcasts

Southern Fried Security – Podcast

September 27, 2020
Software

Tool: Open Threat Exchange (AT&T)

December 29, 2020
Podcasts

Hacking Humans Podcast

February 24, 2021
ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.