Testing • White hat hackers: Ethical hackers hired to ensure security within an firm • Black hat hackers: Individuals with a purpose to breach machines
a trustworthy entity - Attack surfaces: Email or Phone • Web spoofing: Allows an adversary to modify web pages sent to a victim • Vishing: Voice phishing
“The spear phisher thrives on familiarity. He knows your name, your email address, and at least a little about you.” - Symantec • SSL: Secure Sockets Layer • DNS: Domain Name Server • Man-in-the middle attack: Secret interception of communication between parties Characteristics of Spear-phishing attacks