CHAPTER 3: THE HOW
There are a number of attacks that aim to manipulate you into giving an attacker your money or personal information.
• ‘Scareware’, which scares you into doing something that will allow an attacker into your system or give your information to them.
• Ransoming your information, telling you that a ransom must be paid before you regain access to it.
• Diverting you to a false page where you may surrender your information.
• Getting you to reveal some of your secret information that you use to access accounts, such as usernames, passwords, or even a secret PIN or preferred security question.
• Getting you to reveal bank or credit card information.
• Getting you to reveal personal information, which could then be used to get money ...
Get Security in the Digital World- now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.