Another stealth attack type is browser cookie theft. It is said that browser cookies make the web run. Simply put, cookies preserve the action ‘state’ of the user as you surf through the internet. These little pieces of text are sent to our web browser from the websites we frequent making it easier to login, […]
Stealth Attack Types: Renaming File Names and ExtensionsPerhaps the oldest stealth hacking technique involves changing and altering file names and file extension types. The earliest examples took advantage of a major Microsoft Windows weakness whereby Windows would hide different types of file name extensions. This made it easier to send phishing bait that the user would readily click. For example, a hacker […]