On Monday we looked at the some of the primary attack vectors used by cyber-criminals. Here are the rest of the attack vectors that Kevin Thompson from FireEye shared at the Cyber Security Summit. Many of these are significant twists on old exploits, or more sophisticated exploits.
- Attacks using legitimate services.
- Social networks – make friends or connections, gather information.
- Cloud storage services to host malware downloads. Link looks legitimate, its from Google Docs or DropBox.
- Comment ...
NOV