Jokes and pranks, scary stories, wicked costumes and jack-o’-lanterns
are all part of the innocent arsenal of Halloween. By moving them to the
on-line world and adding some malicious payloads, we obtain the perfect
combination for a successful nightmare of systems and data.
The potential Halloween malware offensive, using social
engineering strategies and speculating behavioral vectors of attack, such as
entertainment and curiosity, will be most likely deployed over three particular
channels: social networks, e-mail and Web sites.
Social network platforms, like TwitterTM and Facebook
tags
I rediscovered "all that technical jazz" with the E-Threat Analysis Team at Bitdefender, the creator of one of the industry's most effective lines of internationally certified security software.
View all postsNovember 14, 2024
September 06, 2024