Quantcast
Channel: WEB OF DECEIT
Browsing latest articles
Browse All 10 View Live

Theft of Service

Probably the most common type of attack in telephony, theft of service involves the use of resources for which there is no compensation (e.g., free long-distance services). Voice over Internet Protocol...

View Article



Tracking

Government agencies and law enforcement can track people through signals emanating from cellular technology. Suspects can be monitored, which raises privacy issues. “Police in Los Angeles have tested a...

View Article

Trojan Horse

Computer programs can contain harmful code. A Trojan horse usually masquerades as a useful program that a user wants to execute. A Trojan horse program was found on a computer in a drug-testing lab in...

View Article

Unauthorized Access

An attacker can gain access to billing information, personal information, or other information that is not meant for public disclosure. According to the FBI, part of its Operation Websnare involved “a...

View Article

Unauthorized Use of Resources

Unauthorized use of resources involves acting on data to which an attacker is not entitled, including bandwidth. One example demonstrates the serious nature of such use. An inspector general’s report...

View Article


Viruses

A virus is a program that “infects” computer files, usually an executable program, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into...

View Article

Vishing

Vishing is a method of phishing based on VoIP technology and open source call center software. Scammers set up phony call centers, and then send emails or text messages notifying potential victims that...

View Article

War-Driving

War-driving is a method of gaining entry into wireless computer networks using a laptop, antennas, and a wireless network adaptor, and involves patrolling locations to gain unauthorized access....

View Article


Worms

Worms are independent computer programs that reproduce by copying themselves from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate....

View Article


Zero-Day Exploit

A zero-day exploit is a cyberthreat that takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the general public. There are no available fixes. More Terms...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images