Angler phishing is a type of cyberattack that gets its name from the angler fish.
Why angler fish?
For those unfamiliar with this type of fish, the female anglerfish has a glowing lure at the end of the spine to attract prey (food for her to eat).
What does this have to do with cyber attacks?
Both the hacker and the fish
offer a light to “assist” their victims. Once they have earned their trust, they
launch the attack.
Returning to cybersecurity, in an angler phi...
Both whitelists and blacklists restrict and regulate access to corporate resources and information systems but each security practice follows a different logic.
The blacklists are a collection (list) of pages or content that is believed to be harmful and, therefore, is blocked.
In other words: what is bad is blocked, and the rest can pass. This has been, and still is, the basis on which antivirus software works.
However, the greater sophistication and variet...
It is important to distinguish between these three concepts: Deep Web, Dark Web and Darknet.
Leaving aside the Surface Web, also known as ClearNet, which is the most visible and accessible layer of the Internet (the part that we all know and use on a regular basis), the Deep Web consists of all that content or sites that cannot be accessed directly (not indexed by common browsers like Google, Bing or Yahoo).
The fact that the content of the Deep Web is hidden from the g...
As we near the end of 2018, companies are finalizing their strategies for next year. To do this, we must take into account what’s happened so far.
This past year has been marked by the growing sophistication of threats. We have seen the entry into force of GDPR , the appearance of more targeted attacks, the sudden success of cryptocurrencies and the notable rise of IoT devices. All of these events have forced hackers to reinvent themselves and devise new types of attacks. Thus, we al...
Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies, pinche en el enlace para obtener más información.