{"id":7289,"date":"2015-08-06T07:55:19","date_gmt":"2015-08-05T23:55:19","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1158"},"modified":"2015-08-06T07:55:19","modified_gmt":"2015-08-05T23:55:19","slug":"definition-baiting","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-baiting\/","title":{"rendered":"Definition of the Day: Baiting"},"content":{"rendered":"

Baiting is another sibling to phishing<\/a>. Whereas phishing creates urgency and fear to drive actions baiting uses\u2026well\u2026bait<\/em>.<\/p>\n

A baiter entices the target to give information or visit a poisoned website by offering something of value to the target. It might be free music or movie downloads. It might be an extended trial license of an expensive piece of software. And it doesn\u2019t have to exist solely online.<\/p>\n

Commonly known as “baiting USB’s”, one of the more infamous offline baiting techniques comes in the guise of a free USB storage device sprinkled around a work place or some other public space. The user sees a brand new USB in unspoiled packaging and, thinking he just scored a free USB, opens the package and inserts the USB into his PC. Unfortunately, that USB was pre-installed\u00a0with malware, which is now on the machine, working silently in the background undetected, logging keystrokes, grabbing passwords and otherwise stealing information that could enable identity theft or a cyber heist.<\/p>\n

Moral of the story \u2013 regularly remind your work colleagues to avoid taking what appear to be innocuous steps to get something free online. And don\u2019t EVER use a USB obtained from an unknown source.<\/p>\n","protected":false},"excerpt":{"rendered":"

Baiting is another sibling to phishing. Whereas phishing creates urgency and fear to drive actions baiting uses\u2026well\u2026bait. A baiter entices the target to give information or visit a poisoned website by offering something of value to the target. It might be free music or movie downloads. It might be an extended trial license of an […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346,356],"tags":[355,64,55,263,236,357,25,50,164],"class_list":["post-7289","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","category-explainers","tag-baiting","tag-cyber-crime","tag-cyber-heist","tag-definition-of-the-day","tag-hacking","tag-keystroke-loggers","tag-password-stealing-malware","tag-phishing","tag-social-engineering"],"yoast_head":"\nDefinition of the Day: Online Baiting - BankVault CyberSecurity<\/title>\n<meta name=\"description\" content=\"Online baiting involves enticing a victim with an incentive. Find out how bait and switching can hack into your computer security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-baiting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Online Baiting - BankVault CyberSecurity\" \/>\n<meta property=\"og:description\" content=\"Online baiting involves enticing a victim with an incentive. Find out how bait and switching can hack into your computer security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-baiting\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-05T23:55:19+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Online Baiting - BankVault CyberSecurity","description":"Online baiting involves enticing a victim with an incentive. Find out how bait and switching can hack into your computer security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-baiting\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Online Baiting - BankVault CyberSecurity","og_description":"Online baiting involves enticing a victim with an incentive. Find out how bait and switching can hack into your computer security.","og_url":"https:\/\/www.bankvault.com\/definition-baiting\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-08-05T23:55:19+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-baiting\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-baiting\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Baiting","datePublished":"2015-08-05T23:55:19+00:00","dateModified":"2015-08-05T23:55:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-baiting\/"},"wordCount":208,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["baiting","cyber crime","cyber heist","definition of the day","hacking","keystroke loggers","password-stealing malware","phishing","social engineering"],"articleSection":["Definition of the Day","Explainers"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-baiting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-baiting\/","url":"https:\/\/www.bankvault.com\/definition-baiting\/","name":"Definition of the Day: Online Baiting - BankVault CyberSecurity","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-08-05T23:55:19+00:00","dateModified":"2015-08-05T23:55:19+00:00","description":"Online baiting involves enticing a victim with an incentive. Find out how bait and switching can hack into your computer security.","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-baiting\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-baiting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-baiting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Baiting"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=7289"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7289\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=7289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=7289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=7289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}