A word that is derived from the English word “fishing” (fishing). Phishing attackers try to move with the manipulated E-Mails, web pages or short messages with their victims to their data, such as the Login information to your E-Mail account. The so-called Spear-Phishig of attack is adjusted to the target person with a great effort, personally. General Phishing attacks are often carried out by ordinary Online Criminals, for example, an Online Bank account plunder. Behind-the-targeted Spear-Phishing attacks are often from governments paid a Hacker plug in.
In the case of a hacker attack, it is usually about forcing a System or a network in the knee, to manipulate or steal data. This is frequently exploited the fact that the operators have not kept their systems up to date and, therefore, security gaps. Sometimes, so-called Zero-Day run attacks. Vulnerabilities will be exploited before they could be closed by the software manufacturer through an Update.
a Leak is when confidential data are revealed by an Insider. The American Whistleblower Chelsea Manning, the recording of the attack on an American combat helicopter in Baghdad in which Iraqi civilians and journalists were killed, the news Agency Reuters, for example, has given more. In the latest Online attack, it is not a high probability of a Leak, since the data are derived from apparent different sources.
Doxxing is the publication of personal data in the network. The Affected online should be presented. In addition, the perpetrators want to allow the possibility for abuse of the data. The term derives from the English word “docs” (documents). When Doxxing as many as possible private information such as credit card numbers, Scans of identification documents, confidential home addresses, or phone to be fished numbers illegally and then put online. More to the topic
of politicians, celebrities, journalists
report: Youtuber took the night to hack and got the answer
attacks with artificial intelligence: The new strategies of the Criminals in power
After a Hacker attack on politicians
these are the 10 most common mistakes the hackers are easily
Smartphone, car, E-Mail: how to protect yourself against nasty hackers-Tricks
Hacker in the head
erase memories: brain hacking is real and dangerous for all
attention, false-in-chief is calling! Hackers are getting bolder and smarter.
Best offer BestCheck.de praise/dpa