Found 2 Articles for Phishing

What are Autorun Worms? (How Do They Spread, How to Remove, How to Prevent)

Pranav Bhardwaj
Updated on 09-Jun-2022 11:53:33

494 Views

Autorun Worms, which are commonly disseminated via USB devices, are a "surprise attack" that uses the Windows Auto-Run feature (autorun.inf) to execute malicious code without user knowledge when an infected device is connected to a computer. Many variants of this exploit make use of Windows' Autoplay features.Usually, the danger is in the form of removable media. If an unproven media item is presented and immediately runs, there is a danger of infection.Many modern operating systems disable Auto-Run by default, lowering the risk of this type of worm. Just in case, make sure you have strong endpoint security in place so ... Read More

What is Harpooning? (How it Works, How to Prevent)

Pranav Bhardwaj
Updated on 09-Jun-2022 11:47:29

698 Views

Harpooning is the act of a hacker gathering information from social media sites in order to mimic executives and target employees in their company for the purpose of obtaining sensitive personal data. The security specialists from Mimecast had polled hundreds of IT professionals and determined that a new wave of "whaling" − a type of phishing assault that especially targets C to top-level executives − had impacted firms.Difference between Phishing and CyberwhalingThe difference between phishing and cyberwhaling is almost identical to the difference between real-world fishing and whaling: A "harpoon" instead of a fishnet, targets an enormous target instead of ... Read More

1
Advertisements