Definition of the Day: Pretexting

Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive – it centers around the hacker building a false sense of trust with the victim. The most prevalent […]

Definition of the Day: Watering Hole Attacks

Watering hole attacks were in the news earlier this year (2015) after a Chinese cyber espionage group successfully compromised several major US financial services and defense industry companies. The attack sprang from malicious code injected into www.forbes.com’s ‘Thought of the Day’ widget, which is a flash pop-up users see upon visiting the Forbes.com home page. […]

Stealth Attack Types: Fake WiFi Access Points

One of the most common stealth attack types is creating a fake wireless access point. This attack is common because it; Leverages people’s desire for free WiFi The software required to do it is widely available for free on the internet and, Much sensitive data is passed through wireless networks in the form of unencrypted […]