This document discusses advanced tactics used by cyber criminals such as anonymity techniques, phishing attacks and prevention, spoofing attacks and countermeasures, browser and OS exploitation, sniffing, payloads, click jacking, chain attacks, and security measures for accounts and communications. It also covers topics like waterhole attacks, anti-virus functionality, and social engineering introduction.
This document discusses advanced tactics used by cyber criminals such as anonymity techniques, phishing attacks and prevention, spoofing attacks and countermeasures, browser and OS exploitation, sniffing, payloads, click jacking, chain attacks, and security measures for accounts and communications. It also covers topics like waterhole attacks, anti-virus functionality, and social engineering introduction.
This document discusses advanced tactics used by cyber criminals such as anonymity techniques, phishing attacks and prevention, spoofing attacks and countermeasures, browser and OS exploitation, sniffing, payloads, click jacking, chain attacks, and security measures for accounts and communications. It also covers topics like waterhole attacks, anti-virus functionality, and social engineering introduction.