7 sneak attacks used by today's most devious hackers

Discussion in 'malware problems & news' started by lotuseclat79, Dec 31, 2013.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. Inside Out

    Inside Out Registered Member

    Joined:
    Sep 17, 2013
    Posts:
    421
    Location:
    Pangea
    Just goes to show that 'just not being stupid' doesn't cut it anymore beyond a certain point.
     
  3. AlexC

    AlexC Registered Member

    Joined:
    Apr 4, 2009
    Posts:
    1,288
    Nice article, thanks!
     
  4. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,226
    Apart from the wireless access point thingie, all other methods actually require interaction from the user in a very deliberate manner. How does a malicious calc get into someone's home dir? How does one run a file with a bogus filename? Nothing special there.

    Devious means the delivery method is not obvious. But if it relies on the same tricks like 10 years back, then it's no rocket science.

    Mrk
     
  5. woomera

    woomera Registered Member

    Joined:
    May 21, 2004
    Posts:
    212
    informative, thanks for sharing.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.