A word that is derived from the English word “fishing” (fishing). Phishing attackers try to move with the manipulated E-Mails, web pages or short messages with their victims to their data, such as the Login information to your E-Mail account. The so-called Spear-Phishig of attack is adjusted to the target person with a great effort, personally. General Phishing attacks are often carried out by ordinary Online Criminals, for example, an Online Bank account plunder. Behind-the-targeted Spear-Phishing attacks are often from governments paid a Hacker plug in.

hack attack

In the case of a hacker attack, it is usually about forcing a System or a network in the knee, to manipulate or steal data. This is frequently exploited the fact that the operators have not kept their systems up to date and, therefore, security gaps. Sometimes, so-called Zero-Day run attacks. Vulnerabilities will be exploited before they could be closed by the software manufacturer through an Update.


a Leak is when confidential data are revealed by an Insider. The American Whistleblower Chelsea Manning, the recording of the attack on an American combat helicopter in Baghdad in which Iraqi civilians and journalists were killed, the news Agency Reuters, for example, has given more. In the latest Online attack, it is not a high probability of a Leak, since the data are derived from apparent different sources.


Doxxing is the publication of personal data in the network. The Affected online should be presented. In addition, the perpetrators want to allow the possibility for abuse of the data. The term derives from the English word “docs” (documents). When Doxxing as many as possible private information such as credit card numbers, Scans of identification documents, confidential home addresses, or phone to be fished numbers illegally and then put online. More to the topic

of politicians, celebrities, journalists

report: Youtuber took the night to hack and got the answer

Cyber-threats 2019

attacks with artificial intelligence: The new strategies of the Criminals in power

After a Hacker attack on politicians

these are the 10 most common mistakes the hackers are easily


Smartphone, car, E-Mail: how to protect yourself against nasty hackers-Tricks

Hacker in the head

erase memories: brain hacking is real and dangerous for all

Cybercrime-cost explode

attention, false-in-chief is calling! Hackers are getting bolder and smarter.

Best offer praise/dpa


Please enter your comment!
Please enter your name here