attacks
-

Email Attack via a Recycled Domain
A software engineering friend fell victim to an almost-successful attack on his Facebook account. The attacker…
-
Life Cycle of a Security Bug
Unlike members of the insect family, computer software bugs live forever. Software security bugs (well, flaws)…
-
A Forged “From” Address
To the left we see part of a malicious email. The author brags about how the…
-
A Mac Hack
Here’s a clever two-step attack on a Macintosh. First, the victim downloads a file – it…
-
Interesting Email Scam I Received
I received an impressive email scam recently. My response was to forward it to the email…
-

The Six Types of Cyber-Risks
My textbook lists categories of cyber-attacks that focus on an attack’s lasting impact: how does it affect the…

You must be logged in to post a comment.