Professional Documents
Culture Documents
Scams and phishing are deceptive practices that aim to trick individuals into providing sensitive
information, such as passwords, financial details, or personal information. Here's a brief
overview of each:
Scams:
Definition: Scams are fraudulent schemes designed to deceive individuals or groups, typically
for financial gain.
Common Types:
Lottery or Prize Scams: Notifying individuals that they've won a prize but requiring payment or
personal information to claim it.
Tech Support Scams: Fraudulent calls or messages claiming to be from tech support, asking for
access to your computer or personal information.
Romance Scams: Building online romantic relationships to exploit emotions and solicit money.
Phishing:
Common Types:
Email Phishing: Sending emails that appear to be from a reputable source, tricking recipients
into revealing sensitive information.
Smishing (SMS Phishing): Phishing attacks through text messages, often containing malicious
links or requesting sensitive information.
Scam and phishing
Vishing (Voice Phishing): Phishing attacks conducted over the phone, where attackers
impersonate legitimate entities to obtain information.
Cool Web Search: Redirected web searches and displayed pop-up ads.
Adware:
Super fish: Pre-installed on some Lenovo laptops, injected ads into web pages.
Rootkits:
Sony BMG Rootkit: Used by Sony in some music CDs, had security vulnerabilities.
Alureon (TDSS): Modified the Master Boot Record (MBR) for stealth.
Keyloggers:
Botnets:
Zeus (Game over Zeus): Used for financial fraud and stealing banking information.
Backdoors:
Back Orifice: Created by the hacking group Cult of the Dead Cow.