Malicious code is installed on a
personal computer or server
Misdirects users to fraudulent web sites
without their knowledge or consent
A computer with a compromised host file will go to the fake
Web site even if a user types in the correct internet address
Blagging/pre-texting
Creating and using an invented scenario to engage a targeted victim in
a manner that increases the chance the victim will divulge information
or perform actions that would be unlikely in ordinary circumstances
Like calling a credit card
company as a spouse's and
asking to change account details
Shoulder
surfing
Looking over
someone's shoulder
when they are
entering a passwod
Baiting scenarios
Similar to phishing
A promise of an item or good that
hackers use to attract victims
May offer users free music or movie
downloads, if they surrender their
login credentials to a certain site
Tailgating
Unauthorized person follows an authorized person to enter a secured premise
Quid-pro-quo
Hacker offers a service or
benefit in exchange for
information or access
Something
for
something
Hoax viruses
Message warning the
recipients of a non-existent
computer virus threat
Message is usually a chain e-mail
that tells the recipients to
forward it to everyone they know