๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Webjacking, and how to boot it out

โœ Scribed by Lance Mueller


Book ID
104392350
Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
125 KB
Volume
2006
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


Once installed on the victim's machine, the trojan either edits the host file or modifies the DNS server settings to re-direct specific (or all) look-ups to a fraudulent web server. This server will typically deliver appropriate content most of the time, but is able to re-direct selective requests to a fake web site. The user doesn't click on a link and has no way of knowing that the requested data has been falsified.

Moving target

Phishing is a specific cyber crime that relies heavily on 'social engineering', non-technical breaches of security that focuses on human interaction: in other words, tricking users into doing something they shouldn't. As such, phishing is constantly adapting. Criminals are continually seek ways to trick users and catch them unawares. Technology advancements or a new type of snare to drawn in users are all part of the toolkit.

For more information on avoiding phishing scams, check out the APWG's Consumer Advice on Phishing, www.antiphishing.org.


๐Ÿ“œ SIMILAR VOLUMES


Seroma: How to Avoid It and How to Treat
โœ Ricardo Baroudi; Carlos Alberto Affonso Ferreira ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› Sage Publications ๐ŸŒ English โš– 497 KB