Leoni AG loses €40m in an email scam
We all think that people falling for email scams are really stupid and that we’d never fall for it. But what happens if it happens
We all think that people falling for email scams are really stupid and that we’d never fall for it. But what happens if it happens
Why did hackers attack Ashley Madison? For a long time –at least since the invention of the internet- hackers have always tried to play the moralistic
Baiting is another sibling to phishing. Whereas phishing creates urgency and fear to drive actions baiting uses…well…bait. A baiter entices the target to give information
Piggybacking is a social engineering attack type that gives someone without proper access the ability to gain access to a restricted area, usually by physically
The original Trojan was, indeed, a mythological wooden horse that turned out to be something entirely different than the gift from the gods the mythic
Host file redirection is a stealth attack technique that rightfully falls into the ‘simple genius’ category. Most computer users today are unaware of a Windows
Another stealth attack type is browser cookie theft. It is said that browser cookies make the web run. Simply put, cookies preserve the action ‘state’
Perhaps the oldest stealth hacking technique involves changing and altering file names and file extension types. The earliest examples took advantage of a major Microsoft
Quid pro quo is Latin for, ‘something for something.’ In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers
Bait and switch hacking is a technique on the rise due to the explosion of internet-based content marketing. A bait and switch attack occurs when
USA
92 Natoma St., Suite 211,
San Francisco, CA USA 94105
Australia
88 Havelock Street, West Perth,
Western Australia 6005
477 Boundary St, Suite 802 | The Johnson
Spring Hill, Brisbane, Queensland 4000
©Copyright 2021 BankVault Pty Ltd. All rights reserved.