Companies use various advanced technology solutions for cyber security. Nevertheless, the risk of cyber attack is still present and is far from negligible. Why? The attacker is very well aware of the implemented solutions, so it is easier for him to attack using the human element - you.
Phishing- it is necessary to update the security of your internet banking, click on the LOGIN button… if you click the button, you have fallen for the attacker's ruse and you are on fraudulent but visually and functionally identical pages that resemble your bank pages but are false. If you fill in your login information, you will pass it on voluntarily to the attacker. Similarly, unwanted software can be installed as an attachment to a document (.exe).
Vishing- The phone is ringing. The person at the other end presents himself as a bank employee. Apparently, suspicious movements on your account was identified. It shouldn't be a problem to save your money, just transfer it to a special account. But in reality the person doesn't work at a bank, but is a cheater. By affecting the victim over the phone, an attacker can also access your mobile operator's service settings. The attacker's motivation may not only be financial, but may also want to cause personal problems.
Spear phishing- A similar scenario as phishing, but targeted at a smaller group. E.g., the entire accounting department will receive an email with an invoice payable as soon as possible.
Whaling- Phishing attack targeted at individuals (CFO, CEO). Attacks are more sophisticated, for example, attackers are tracking the victim’s activity and adjusting the attack to them.
Watering Hole Attack - As in nature, where a hunter waits until the victim comes to drink water, the attacker infects the target website with malware and encourages users to visit it through a sent or shared web link. The victim then on the page unknowingly installs malware in his computer that can cause damage.
Hoax- This is an alarm message that can subsequently cuse damage. For example, as information about newly discovered malware that spreads uncontrollably among computers. If a user finds this specific file on his computer, he is prompted to delete the file. However, it is an important file for the operating system and its removal will cause your computer to malfunction.