Theft of Service
Probably the most common type of attack in telephony, theft of service involves the use of resources for which there is no compensation (e.g., free long-distance services). Voice over Internet Protocol...
View ArticleTracking
Government agencies and law enforcement can track people through signals emanating from cellular technology. Suspects can be monitored, which raises privacy issues. “Police in Los Angeles have tested a...
View ArticleTrojan Horse
Computer programs can contain harmful code. A Trojan horse usually masquerades as a useful program that a user wants to execute. A Trojan horse program was found on a computer in a drug-testing lab in...
View ArticleUnauthorized Access
An attacker can gain access to billing information, personal information, or other information that is not meant for public disclosure. According to the FBI, part of its Operation Websnare involved “a...
View ArticleUnauthorized Use of Resources
Unauthorized use of resources involves acting on data to which an attacker is not entitled, including bandwidth. One example demonstrates the serious nature of such use. An inspector general’s report...
View ArticleViruses
A virus is a program that “infects” computer files, usually an executable program, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into...
View ArticleVishing
Vishing is a method of phishing based on VoIP technology and open source call center software. Scammers set up phony call centers, and then send emails or text messages notifying potential victims that...
View ArticleWar-Driving
War-driving is a method of gaining entry into wireless computer networks using a laptop, antennas, and a wireless network adaptor, and involves patrolling locations to gain unauthorized access....
View ArticleWorms
Worms are independent computer programs that reproduce by copying themselves from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate....
View ArticleZero-Day Exploit
A zero-day exploit is a cyberthreat that takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the general public. There are no available fixes. More Terms...
View Article
More Pages to Explore .....