1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Phishing
the use of digital communications to trick people into revealing sensitive data or deploying malicious software
Phishing Kit
a collection of software tools needed to launch a phishing campaign
Smishing
the use of text messages to obtain sensitive information or to impersonate a known source
Vishing
the exploitation of electronic voice communication to obtain sensitive information or impersonate a known source
Spear Phishing
a subset of email phishing in which specific people are purposefully targeted, such as the accountants of a small business.
Whaling
a category of spear phishing attempts that are aimed at high-ranking executives in an organization.
BlueSnarfing
exploiting bluetooth devices by establishing an unauthorized connection and retrieving sensitive information from them.
Pharming
redirecting requests to fraudulent websites via DNS spoofing
Watering hole attack
when attackers target a specific group and exploits websites that the group commonly visits by injecting malicious code, users that visit the website will be automatically infected without their knowledge
Pretexting
creating a fake scenario to elicit sensitive information from victims
Prepending
when an attacker manipulates the caller ID to make it seem as if its calling from a trusted entity
Rootkit
a type of malicious software that is installed by attackers to provide persistent and stealthy access to a system, they are used to manipulate system functions, files, intercept network traffic
Fileless virus
malware that resides and executes within a system’s memory that does not leave a trace behind
Cryptomalware
malicious software that is used to encrypt files on a user’s system, until a ransom is paid to the attacked.
Spyware
malicious software that is used to gather information from a user’s device without their knowledge or consent