Angler phishing is a type of cyberattack that gets its name from the angler fish.
Why angler fish?
For those unfamiliar with this type of fish, the female anglerfish has a glowing lure at the end of the spine to attract prey (food for her to eat).
What does this have to do with cyber attacks?
Both the hacker and the fish
offer a light to “assist” their victims. Once they have earned their trust, they
launch the attack.
Returning to cybersecurity, in an angler phi...
Both whitelists and blacklists restrict and regulate access to corporate resources and information systems but each security practice follows a different logic.
The blacklists are a collection (list) of pages or content that is believed to be harmful and, therefore, is blocked.
In other words: what is bad is blocked, and the rest can pass. This has been, and still is, the basis on which antivirus software works.
However, the greater sophistication and variet...
The word pharming is formed by combining two different terms: “phishing” and “farming”. According to the Spanish Data Protection Agency, a pharming attack is the method normally used to carry out “phishing attacks”.
A pharming attack redirects the domain name server (DNS) of a trusted entity to an identical web page that has been created by the hacker to obtain the user´s privacy data.
The main difference between a phishing and a pharming attack is that, in the latter,...
It is important to distinguish between these three concepts: Deep Web, Dark Web and Darknet.
Leaving aside the Surface Web, also known as ClearNet, which is the most visible and accessible layer of the Internet (the part that we all know and use on a regular basis), the Deep Web consists of all that content or sites that cannot be accessed directly (not indexed by common browsers like Google, Bing or Yahoo).
The fact that the content of the Deep Web is hidden from the g...
Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies, pinche en el enlace para obtener más información.