{"id":47,"date":"2020-07-10T12:30:32","date_gmt":"2020-07-10T16:30:32","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/"},"modified":"2025-09-15T10:35:47","modified_gmt":"2025-09-15T14:35:47","slug":"spear-phishing","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/","title":{"rendered":"Spear Phishing"},"content":{"rendered":"<p>Spear phishing is a highly targeted form of phishing, which is an email that is made to appear to come from a friend, colleague or business you are familiar with.<\/p>\n<p>If phishing is putting your hook into the water hoping anyone bites, then spear phishing is knowing what type of fish you\u2019re looking for and using specific information to reel them in. This will generally appear as an urgent looking email, and will either ask you for sensitive information and\/or link to malicious content.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spear phishing is a highly targeted form of phishing, which is an email that is made to appear to come from a friend, colleague or business you are familiar with. If phishing is putting your hook into the water hoping anyone bites, then spear phishing is knowing what type of fish you\u2019re looking for and&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":658,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-47","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Spear Phishing | IT Department | Adelphi University<\/title>\n<meta name=\"description\" content=\"Don&#039;t take the bait. Avoid becoming a victim of spear phishing by staying informed and following tips provided to you by Adelphi University&#039;s Office of IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spear Phishing | IT Department | Adelphi University\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t take the bait. Avoid becoming a victim of spear phishing by staying informed and following tips provided to you by Adelphi University&#039;s Office of IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-15T14:35:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"Spear Phishing | IT Department | Adelphi University","description":"Don't take the bait. Avoid becoming a victim of spear phishing by staying informed and following tips provided to you by Adelphi University's Office of IT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Spear Phishing | IT Department | Adelphi University","og_description":"Don't take the bait. Avoid becoming a victim of spear phishing by staying informed and following tips provided to you by Adelphi University's Office of IT.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/","og_site_name":"Information Technology","article_modified_time":"2025-09-15T14:35:47+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/","url":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/","name":"Spear Phishing | IT Department | Adelphi University","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T16:30:32+00:00","dateModified":"2025-09-15T14:35:47+00:00","description":"Don't take the bait. Avoid becoming a victim of spear phishing by staying informed and following tips provided to you by Adelphi University's Office of IT.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/spear-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Phishing","item":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/"},{"@type":"ListItem","position":4,"name":"Spear Phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/47"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":4,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/47\/revisions"}],"predecessor-version":[{"id":730,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/47\/revisions\/730"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/658"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}