Rather than targeting a single device, pharming attacks infiltrate computer networks to glean information about multiple accounts in-bulk. Pharming attackers can infiltrate a system by accessing just a single network component. Once positioned, they redirect users to illegitimate sites.
Read MoreSome attacks target DNS caches—the internal repository of sites that a user has already loaded. A computer typically references these cache files to load pages more quickly. An attack here will redirect traffic to phony sites. A successful DNS cache poisoning attack will redirect traffic to phony sites.
Read MoreDictionary attacks use language to guess account passwords. Attackers go through lists of terms beginning with commonly used constructions and expanding to more rare phrases. Users typically choose terms within language rather than characters at random, so this method is quite effective.
Read MoreA brute-force attack randomly exhausts alpha-numeric entries. Attackers apply combinations in sequence until they are successful. Brute-force attacks are typically a place of last resort and require serious computational assistance!
Read MoreTrojans are downloaded files that give a hacker internal access to a device. Attackers must manipulate trojans once they have infiltrated a system and although trojans don’t self-replicate, they can still be quite harmful! The best mitigation is reasonable caution when accessing foreign files, especially executables.
Read MoreMan-in-the-Middle attacks are a form of active eavesdropping. An attacker takes control of communications: receiving, manipulating and sending messages between victims. Man-in-the-middle attacks make use of internet networks—so Wi-Fi networks that are not encrypted make nice targets.
Read MoreAs the name infers, a man-in-the-phone attack manipulates phone capability. An attacker might monitor call or message activity or even attempt to interfere with phone functionality. Prevent man-in-the-phone attacks with two-factor authentication.
Read MoreAttackers are extremely adept at manipulating webpages these days. Many attacks are initiated through aim at a target’s online site. An effective attacker can intercept and redirect messages through control of a browser, leaving bank transfers particularly exposed.
Read MoreThis attack is exceedingly relevant in light of increasing mobile functionality. Hackers can wreak extensive havoc with access to a modern smart mobile device. SAASPASS mitigates man-in-the-mobile threats with offline, dual-channel, two-factor authentication technology.
Read MoreAttacks have been structured to infiltrate sites by circumventing CAPTCHA submissions. These attacks work by capitalizing on cheap labor or bugs that try to bypass CAPTCHA prompts.
Read More