Forum Discussion
HeikeRitter
Microsoft
Mar 20, 2023Ninja Cat Giveaway: Episode 5 | Mobile Threat Defense
For this episode, your opportunity to win a plush ninja cat is the following -
Reply to this thread with: After assessing this discussion with Yuji, tell us what are at least 3 common attack vector...
Erik_Moreau
Mar 20, 2023MVP
- Social manipulation: This is when malicious actors send fake emails (phishing) or text messages (smishing) to users to trick them into giving private information such as their passwords or downloading malware on their devices.
- Data breaches via malicious apps: This happens when users download apps that look legitimate but actually skim data from their device. Examples are spyware and malware that steal personal and business information without users realizing it.
- Network-based attacks: These are especially common and risky because cybercriminals can steal unencrypted data while people use public WiFi networks.
- Data breaches via malicious apps: This happens when users download apps that look legitimate but actually skim data from their device. Examples are spyware and malware that steal personal and business information without users realizing it.
- Network-based attacks: These are especially common and risky because cybercriminals can steal unencrypted data while people use public WiFi networks.