The scenario
Now let's say you've been job hunting, submitting applications, and posting your resume on various online boards. Someone e-mails you who claims to be a manager at this prestigious company with a good position on offer, but you need to print out the application, fill it out, scan it, then send it back, and then wait for a call to set up an appointment. This e-mail includes a PDF of the job application; once users click on it the payload is executed and now your system is compromised. This PDF could've been a back door or a remote access Trojan (RAT), paired with a phishing attempt to steal your information. It's a sad reality; often the victims can be anyone and now social engineering can make things a lot easier for the cyber ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access