{"id":3119,"date":"2024-10-29T10:27:43","date_gmt":"2024-10-29T10:27:43","guid":{"rendered":"https:\/\/www.cyber-rs.de\/?post_type=encyclopedia&#038;p=3119"},"modified":"2024-10-29T13:05:26","modified_gmt":"2024-10-29T13:05:26","slug":"pharming","status":"publish","type":"encyclopedia","link":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/","title":{"rendered":"Pharming"},"content":{"rendered":"<div class=\"ewa-rteLine\">Pharming is a term used in information technology and refers to a form of Internet fraud in which cyber criminals attempt to steal user data such as passwords or credit card information by using manipulated websites or DNS servers. The user is redirected to a fake website that resembles the real website but is actually controlled by the criminals.<\/div>\n<div><\/div>\n<div class=\"ewa-rteLine\">Pharming attacks can be carried out using various techniques, such as <a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/dns-spoofing\/\" target=\"_self\" title='DNS spoofing (also known as DNS spoofing or DNS hijacking ) is an attack technique in which attackers manipulate the Domain Name System (DNS) to direct users to fake websites. The DNS is responsible for converting web addresses such as\"www.example.com\" into the IP address of the corresponding server. In a DNS spoofing attack, attackers manipulate&hellip;' class=\"encyclopedia\">DNS spoofing<\/a>, where the attacker manipulates the DNS server so that it redirects the user to the fake website instead of the real one. Another method is to use malware that is installed on the user&rsquo;s computer and then manipulates the DNS cache.<\/div>\n<div><\/div>\n<div class=\"ewa-rteLine\">The consequences of pharming attacks can be serious, as the attackers may have access to sensitive data such as passwords, bank details or personal information. However, users can protect themselves by ensuring their systems are protected with anti-virus and firewall software and only visiting trusted websites. It is also important to ensure that the URL of the website you are visiting is correct and that the website has a secure connection (https).<\/div>\n<div><\/div>\n<div>\n<p class=\"p1\">Do you have any questions? <a href=\"https:\/\/www.cyber-rs.de\/kontakt\/\"><span class=\"s1\">Write to us<\/span><\/a> or simply give us a call: +49 212 880 22 962.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pharming is a term used in information technology and refers to a form of Internet fraud in which cyber criminals attempt to steal user data such as passwords or credit card information by using manipulated websites or DNS servers. The &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/\">Read More<\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[],"tags":[],"class_list":["post-3119","encyclopedia","type-encyclopedia","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pharming - Cyber Resilience Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pharming\" \/>\n<meta property=\"og:description\" content=\"Pharming is a term used in information technology and refers to a form of Internet fraud in which cyber criminals attempt to steal user data such as passwords or credit card information by using manipulated websites or DNS servers. The &hellip; Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-29T13:05:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/pharming\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/pharming\\\/\",\"name\":\"Pharming - Cyber Resilience Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\"},\"datePublished\":\"2024-10-29T10:27:43+00:00\",\"dateModified\":\"2024-10-29T13:05:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/pharming\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/pharming\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/pharming\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/home-3\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossar\",\"item\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/glossar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pharming\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"name\":\"Cyber Resilience Solutions\",\"description\":\"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\",\"name\":\"Cyber Resilience Solutions\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"width\":1293,\"height\":161,\"caption\":\"Cyber Resilience Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/76985476\\\/admin\\\/feed\\\/posts\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pharming - Cyber Resilience Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/","og_locale":"en_US","og_type":"article","og_title":"Pharming","og_description":"Pharming is a term used in information technology and refers to a form of Internet fraud in which cyber criminals attempt to steal user data such as passwords or credit card information by using manipulated websites or DNS servers. The &hellip; Read More","og_url":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/","og_site_name":"Cyber Resilience Solutions","article_modified_time":"2024-10-29T13:05:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/","url":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/","name":"Pharming - Cyber Resilience Solutions","isPartOf":{"@id":"https:\/\/www.cyber-rs.de\/en\/#website"},"datePublished":"2024-10-29T10:27:43+00:00","dateModified":"2024-10-29T13:05:26+00:00","breadcrumb":{"@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber-rs.de\/en\/glossar\/pharming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.cyber-rs.de\/en\/home-3\/"},{"@type":"ListItem","position":2,"name":"Glossar","item":"https:\/\/www.cyber-rs.de\/en\/glossar\/"},{"@type":"ListItem","position":3,"name":"Pharming"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber-rs.de\/en\/#website","url":"https:\/\/www.cyber-rs.de\/en\/","name":"Cyber Resilience Solutions","description":"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.","publisher":{"@id":"https:\/\/www.cyber-rs.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber-rs.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber-rs.de\/en\/#organization","name":"Cyber Resilience Solutions","url":"https:\/\/www.cyber-rs.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","contentUrl":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","width":1293,"height":161,"caption":"Cyber Resilience Solutions"},"image":{"@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/76985476\/admin\/feed\/posts\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/encyclopedia\/3119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/encyclopedia"}],"about":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/types\/encyclopedia"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/users\/7"}],"wp:attachment":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/media?parent=3119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/categories?post=3119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/tags?post=3119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}