![]() MAN-IN-THE-MIDDLE: The cybercriminal intercepts the communication between 2 or more interlocutors and impersonates the identity of one (or more!) of the parties, to see the information and modify it at will.Īs we can see, passwords are no longer the most secure and effective method to protect access to our systems.KEYLOGGER ATTACK: The attacker infects keyboards by installing software that tracks and records what is typed, thus stealing passwords.SOCIAL ENGINEERING: Tricking the user into delivering their access credentials through techniques such as phishing (via e-mail), smishing (via SMS), vishing (via a call), warshipping (an infected technological gift), or shoulder surfing (spying on the password while the user is unaware).PASSWORD SPRAYING: The cybercriminal acquires a list of accounts and tries to access them using a set of widely used passwords, until one matches.BRUTE FORCE ATTACK: The attacker attempts to access a system repeatedly, using different combinations of characters, until one of them matches and gains access. ![]() These bad practices can trigger cyber-attacks that expose the sensitive information of organizations Let’s look at some of them:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |