My Bitdefender
  • 0 Shopping Cart

Bitdefender Blog

Seven Sneak Attacks Used Today…

by Dan Lowe, on 21 October 2013

Criminals keep on innovating to lure you into their trap. Watch out for their latest tricks!

Criminals keep on innovating as they are repurpose some old tricks to lure you into using a trusted network, installing malicious files, stealing encrypted sessions, loading different file names, loading files to wrong directories, redirecting you to malicious sites, poisioning popular virtual locations, or using bait and switch techniques. In an article by Roger Grimes titled, "7 Sneak Attacks Used By Today's Most Devious Hackers" explains some of the more popular hacker techniques used today. It is an interesting to remember that some safety precautions maybe outdated.

You can go to the original article by clicking the link: http://www.computerworld.com/s/article/9242814/7_sneak_attacks_used_by_today_39_s_most_devious_hackers?taxonomyId=85

Dan Lowe

Dan Lowe, an OEM Senior Marketing Manager, has been working with Bitdefender for the last 3 ½ years. His familiarity with multiple security products from Firewalls to Antivirus has provided him a unique perspective on the security industry.

Daily "Did you know?"

On July 31, 2008, the Koobface computer worm started to target users of Facebook and MySpace; and new variants still constantly appear.

Authors

  • Bitdefender Security Specialists
    Bitdefender Labs
  • Catalin Cosoi
    Chief Security Researcher
  • Dan Lowe
    Dan Lowe, an OEM Senior Marketing Manager, has been working with Bitdefender for the last 3 ½ years. His familiarity with multiple security products from Firewalls to Antivirus has provided him a unique perspective on the security industry.
  • Ligia Adam
    Security Evangelist and Social Media Professional
  • Loredana Botezatu
    Loredana Botezatu – E-threat Analyst – Loredana has been writing about the IT world and e-security for well over five years. She has made a personal goal out of educating computer users about the ins and outs of the cybercrime ecosystem.

Categories

HOTforSecurity