{"id":26540,"date":"2021-10-06T10:33:41","date_gmt":"2021-10-06T10:33:41","guid":{"rendered":"http:\/\/35.157.126.229\/2021\/10\/06\/cyber-card-19-pharming-infographic\/"},"modified":"2024-05-02T15:55:39","modified_gmt":"2024-05-02T15:55:39","slug":"cyber-card-19-pharming-infographic","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/","title":{"rendered":"Cyber Card #19 \u2013 Pharming Infographic"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;||||true|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis: 100%;\">\n<p>Pharming, a neologism based on the words \u201cfarming\u201d and \u201cphishing\u201d, is a very devious technique that substitutes an address on a legitimate website without the victim\u2019s knowledge, and redirects the victim to a malicious site. This can happen without the user realising that they have been diverted to a fake website, which appears to be absolutely identical to the legitimate one.<\/p>\n<p>Indeed, by using malware or a Trojan previously installed on the device, a hacker can redirect the user to a malicious website, even if the user has typed the correct name in the browser address bar. This technique is widely used by cyber criminals to obtain sensitive information, such as bank data, access credentials or to spread malware.<\/p>\n<p><em><strong>This infographic provides some useful information on how to recognise and avoid it!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/19EN-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/19EN-724x1024.png\" alt=\"\" class=\"wp-image-25703\" width=\"821\" height=\"1161\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pharming, a neologism based on the words \u201cfarming\u201d and \u201cphishing\u201d, is a very devious technique that substitutes an address on a legitimate website without the victim\u2019s knowledge, and redirects the victim to a malicious site. This can happen without the user realising that they have been diverted to a fake website, which appears to be [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[487,833,470,834,592],"class_list":["post-26540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en","tag-cyber-awareness-en-2","tag-cyber-card-en-2","tag-cyber-security-awareness-en-3","tag-infografica-en-2","tag-pharming-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #19 \u2013 Pharming Infographic - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Pharming is a very devious technique that substitutes, without the victim&#039;s knowledge, a legitimate website address for a malicious one...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #19 \u2013 Pharming Infographic\" \/>\n<meta property=\"og:description\" content=\"Pharming is a very devious technique that substitutes, without the victim&#039;s knowledge, a legitimate website address for a malicious one...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T10:33:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T15:55:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #19 \u2013 Pharming Infographic\",\"datePublished\":\"2021-10-06T10:33:41+00:00\",\"dateModified\":\"2024-05-02T15:55:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/\"},\"wordCount\":254,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19EN-1.png\",\"keywords\":[\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"infografica\",\"pharming\"],\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/\",\"name\":\"Cyber Card #19 \u2013 Pharming Infographic - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19EN-1.png\",\"datePublished\":\"2021-10-06T10:33:41+00:00\",\"dateModified\":\"2024-05-02T15:55:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Pharming is a very devious technique that substitutes, without the victim's knowledge, a legitimate website address for a malicious one...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19EN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19EN-1.png\",\"width\":1440,\"height\":810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/10\\\/06\\\/cyber-card-19-pharming-infographic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #19 \u2013 Pharming Infographic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #19 \u2013 Pharming Infographic - Cyber Guru","description":"Pharming is a very devious technique that substitutes, without the victim's knowledge, a legitimate website address for a malicious one...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #19 \u2013 Pharming Infographic","og_description":"Pharming is a very devious technique that substitutes, without the victim's knowledge, a legitimate website address for a malicious one...","og_url":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2021-10-06T10:33:41+00:00","article_modified_time":"2024-05-02T15:55:39+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #19 \u2013 Pharming Infographic","datePublished":"2021-10-06T10:33:41+00:00","dateModified":"2024-05-02T15:55:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/"},"wordCount":254,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png","keywords":["Cyber Awareness","cyber card","Cyber Security Awareness","infografica","pharming"],"articleSection":["Cyber Card"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/","url":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/","name":"Cyber Card #19 \u2013 Pharming Infographic - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png","datePublished":"2021-10-06T10:33:41+00:00","dateModified":"2024-05-02T15:55:39+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Pharming is a very devious technique that substitutes, without the victim's knowledge, a legitimate website address for a malicious one...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19EN-1.png","width":1440,"height":810},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2021\/10\/06\/cyber-card-19-pharming-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #19 \u2013 Pharming Infographic"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=26540"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26540\/revisions"}],"predecessor-version":[{"id":28494,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26540\/revisions\/28494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/25708"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=26540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=26540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=26540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}