Do you know how they hacked your account? Part one: Downloading the infection

A cyber-attack is classified as any type of offensive action used by cyber criminals to deploy malicious code in your system with the purpose of stealing, altering, destroying, or taking any advantage of this action. Cyber-attacks can target both people and things. ANYWHERE. ANYTIME.  Individual users, computer networks, information systems, IT infrastructure of all types and sizes […]

Difference between Phishing and Pharming

Phishing and pharming have the same aims, namely to harvest sensitive data from people. Phishing, though, tries to deceive people into doing this, while pharming uses ransomware and DNS poisoning to funnel citizens to malicious websites. Types of Phishing Vishing Whaling Spear Phishing Clone Phishing Types of Pharming Hosts file Pharming Poisoned DNS servers Difference […]

What is Pharming? How does Pharming work?

The word pharming comes from a combination of “phishing” and “farming” and is a type of cyber-attack in social engineering. It is also known as Phishing without a lure. Pharming is when an Internet user is guided to a fake website rather than a real one by a hacker. Such places will collect the personal […]

Scroll to top