Perhaps the oldest stealth hacking technique involves changing and altering file names and file extension types. The earliest examples took advantage of a major Microsoft Windows weakness whereby Windows would hide different types of file name extensions. This made it easier to send phishing bait that the user would readily click. For example, a hacker […]
Definition of the Day: Quid Pro Quo AttackQuid pro quo is Latin for, ‘something for something.’ In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of […]