This type of malware holds your data until you pay a fee.
What is ransomware?
One of the most common examples of Phishing today is from the DMV warning about what?
What are unpaid tolls?
While commonly used in refernce to social media, this guides the mathematical procedures for both encryption and decryption processes.
What is an algorithm?
This worm, allegedly from the US and Israel, targeted Natanz, an Iranian nuclear plant, and escaped outside the facility.
What is Stuxnet?
This is mimicking a legitimate brand or company, often associated with phising attacks.
What is brand impersonation?
This is a virus that is capable of self-replicating.
What is a worm?
Vishing is short for this type of phising done by phone call.
What is voice phising?
This is the practice of intentionally making something unclear or difficult to understand.
What is obfuscation?
In 2009, Fannie May would have lost all of their data due to this type of delayed attack set by a disgruntled employee if they hadn't spotted it in time.
What is logic bomb?
This is intentionally false information spread for malicious reasons.
What is disinformation?
This type of malware, named after something in Greek mythology, is known for looking harmless.
What is a Trojan?
This type of phising is personalized to the target.
What is spear fishing?
This is the practice of hiding information in order to prevent its detection.
What is steganography?
An example of this was when Chad Scira was able to get infinte Chase Rewards Points from this company by transferring points from a negative account into a positive one.
What are race conditions?
This is a social engineering attack in which an attack follows after someone in order to get into a locked area.
What is tailgating?
These are applications preloaded on your device to slow it down.
What is bloatware?
SPIM is short for this type of phising seen with apps such as Discord.
What is Spam over Internet Messaging?
This is a software-based solution that facilitates the generation, storage, distribution, and management of cryptographic keys.
What is a key management system?
iPhone products bricked when set to this date because of interger overflow.
When is January 1, 1970?
This is a type of cyberattack where an attacker uses a business email account for fraudeulent activities.
What is a Business Email Compromise (BEC)?
This is software that is not inheritenly malicious, but can be used to bypass security controls.
What is a backdoor?
John Podest, a member of Hillary Clinton's campaign, was a whaling victim of this Russian hacking group.
What is Fancy Bear?
This cryptographic tool is a hardware-based security chip or module embedded in a computer's motherboard.
What is a Trusted Platform Module (TPM)
Printers have started secretly added these to every printed page to track users in case the papers are used for crimes.
What are tiny, yellow dots?
This is simply a deception and can be humorous or malicious.
What is a hoax?