Cyber Security term 37: Vishing
Vishing is another attack that hackers try to use to get access to information. Vishing is also called voice phishing, and it is special because […]
Vishing is another attack that hackers try to use to get access to information. Vishing is also called voice phishing, and it is special because […]
The Trojan Horse is a malicious program that’s like the Trojan horse from the myth. The trojan horse acts like a backdoor for the attacker. […]
Social Engineering happens when a hacker tricks a user into giving them information. A social engineer is a person that finds an individual user and […]
A script kiddie is a word used for the beginners in hacking and cracking. Since they are a beginner they don’t have the skill to […]