About Threats

Phishing

Phishing attackers guide victims to phony websites in an effort to collect account information. Phishers make every effort to echo a genuine site and fool visitors into entering account credentials.

Read More

Pharming

Rather than targeting a single device, pharming attacks infiltrate computer networks to glean information about multiple accounts in-bulk. Pharming attackers can infiltrate a system by accessing just a single network component. Once positioned, they redirect users to illegitimate sites.

Read More

DNS Cache Poisoning

Some attacks target DNS caches—the internal repository of sites that a user has already loaded. A computer typically references these cache files to load pages more quickly. An attack here will redirect traffic to phony sites. A successful DNS cache poisoning attack will redirect traffic to phony sites.

Read More

Dictionary Attack

Dictionary attacks use language to guess account passwords. Attackers go through lists of terms beginning with commonly used constructions and expanding to more rare phrases. Users typically choose terms within language rather than characters at random, so this method is quite effective.

Read More

Brute-Force Attack

A brute-force attack randomly exhausts alpha-numeric entries. Attackers apply combinations in sequence until they are successful. Brute-force attacks are typically a place of last resort and require serious computational assistance!

Read More

Trojans

Trojans are downloaded files that give a hacker internal access to a device. Attackers must manipulate trojans once they have infiltrated a system and although trojans don’t self-replicate, they can still be quite harmful! The best mitigation is reasonable caution when accessing foreign files, especially executables.

Read More

Man-in-the-Middle

Man-in-the-Middle attacks are a form of active eavesdropping. An attacker takes control of communications: receiving, manipulating and sending messages between victims. Man-in-the-middle attacks make use of internet networks—so Wi-Fi networks that are not encrypted make nice targets.

Read More

Man-in-the-Phone

As the name infers, a man-in-the-phone attack manipulates phone capability. An attacker might monitor call or message activity or even attempt to interfere with phone functionality. Prevent man-in-the-phone attacks with two-factor authentication.

Read More

Man-in-the-Browser

Attackers are extremely adept at manipulating webpages these days. Many attacks are initiated through aim at a target’s online site. An effective attacker can intercept and redirect messages through control of a browser, leaving bank transfers particularly exposed.

Read More

Man-in-the-Mobile

This attack is exceedingly relevant in light of increasing mobile functionality. Hackers can wreak extensive havoc with access to a modern smart mobile device. SAASPASS mitigates man-in-the-mobile threats with offline, dual-channel, two-factor authentication technology.

Read More

CAPTCHA Attacks

Attacks have been structured to infiltrate sites by circumventing CAPTCHA submissions. These attacks work by capitalizing on cheap labor or bugs that try to bypass CAPTCHA prompts.

Read More