CHAPTER 3: THE HOW

There are a number of attacks that aim to manipulate you into giving an attacker your money or personal information.

  • ‘Scareware’, which scares you into doing something that will allow an attacker into your system or give your information to them.

  • Ransoming your information, telling you that a ransom must be paid before you regain access to it.

  • Diverting you to a false page where you may surrender your information.

  • Getting you to reveal some of your secret information that you use to access accounts, such as usernames, passwords, or even a secret PIN or preferred security question.

  • Getting you to reveal bank or credit card information.

  • Getting you to reveal personal information, which could then be used to get money ...

Get Security in the Digital World- now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.