{"id":431,"count":31,"description":"Was ist Phishing? Cyber-Diebe verleiten ihre Opfer dazu, personenbezogene Daten preiszugeben oder \u00fcber E-Mails oder andere Kommunikationsmethoden Schadsoftware zu installieren. Der Absender weist die Empf\u00e4nger an, auf einen Link zu klicken, der sie zu einer Seite f\u00fchrt, auf der sie personenbezogene Daten, Kontoinformationen und andere Details best\u00e4tigen m\u00fcssen.\r\n\r\nDie Titel in dieser Kategorie zeigen, was Phishing ist, welche Arten von Phishing-Angriffen es gibt und wie Sie sich und Ihr Unternehmen vor Phishing sch\u00fctzen k\u00f6nnen.","link":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/","name":"Phishing","slug":"phishing-de","taxonomy":"category","parent":426,"meta":[],"acf":[],"yoast_head":"\nPhishing Archives - EasyDMARC<\/title>\n<meta name=\"description\" content=\"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Archives\" \/>\n<meta property=\"og:description\" content=\"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-X-Different-Types-of-Data-Leaks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/\",\"url\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/\",\"name\":\"Phishing Archives - EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/#website\"},\"description\":\"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.\",\"breadcrumb\":{\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/#breadcrumb\"},\"inLanguage\":\"de\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/easydmarc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersicherheit\",\"item\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberangriffe und Cyberbedrohungen\",\"item\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/#website\",\"url\":\"https:\/\/easydmarc.com\/blog\/de\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/easydmarc.com\/blog\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/easydmarc.com\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\/\/easydmarc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\/\/easydmarc.com\/img\/logo.png\"},\"image\":{\"@id\":\"https:\/\/easydmarc.com\/blog\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EasyDMARC\/\",\"https:\/\/x.com\/easydmarc\",\"https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Archives - EasyDMARC","description":"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/","og_locale":"de_DE","og_type":"article","og_title":"Phishing Archives","og_description":"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.","og_url":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/","og_site_name":"EasyDMARC","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/Top-X-Different-Types-of-Data-Leaks.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@easydmarc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/","url":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/","name":"Phishing Archives - EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/de\/#website"},"description":"Phishing erkl\u00e4rt: Alles \u00fcber Methoden, Anzeichen und Schutzma\u00dfnahmen, damit Ihre Organisation vor betr\u00fcgerischen E-Mails sicher bleibt.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/#breadcrumb"},"inLanguage":"de"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/phishing-de\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/"},{"@type":"ListItem","position":3,"name":"Cybersicherheit","item":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/"},{"@type":"ListItem","position":4,"name":"Cyberangriffe und Cyberbedrohungen","item":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/de\/category\/blog-de\/cybersicherheit-de\/cyberangriffe-und-cyberbedrohungen\/social-engineering-de\/"},{"@type":"ListItem","position":6,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/de\/#website","url":"https:\/\/easydmarc.com\/blog\/de\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]}]}},"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/de\/wp-json\/wp\/v2\/categories\/431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/de\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/de\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/de\/wp-json\/wp\/v2\/categories\/426"}],"wp:post_type":[{"href":"https:\/\/easydmarc.com\/blog\/de\/wp-json\/wp\/v2\/posts?categories=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}