• attacks.. what happened?

    From August Abolins@2:221/1.58 to All on Monday, March 28, 2022 16:37:00
    An oldie.. but may still be worth comparing it to 2022.

    "The top hacking techniques of 2015 and how they work
    "Posted by Jamie Boote on Monday, December 14, 2015

    [1] Reflected file download (RFD)

    Let's say that one morning you wake up and try to print some
    last minute work notes out on your home printer. Without luck,
    you decide to re-install the print driver. While browsing the
    Internet, looking for a driver, you find that someone has
    linked to a file on a forum that may suit your needs. As a good
    internet user, you check where the link really leads and find
    that it does point to a legitimate site. You click and run the
    file; however, your computer is compromised and an attacker
    gets in. What happened?

    [2] Autonomous carjacking

    After getting tricked into downloading a file you shouldn't
    have, you're already late for work. During your drive, without
    warning, the AC turns up to full blast, the radio begins
    playing, and the transmission stops transmitting power. Your
    car just got hacked.

    This is the new reality of ever-smarter cars. As cars stop
    resembling the mechanical carriages of years past and start
    looking more and more like fly-by-wire fighter aircraft, more
    and more systems are controlled by computers. With cars acting
    as mobile hotspots, the barrier to unauthorized entry is
    lowered dramatically. What happened?

    [3] The POODLE attack

    After somehow regaining control of your car, you drive into the
    nearest coffee spot and reflect on how it was once illegal to
    send encryption technology outside US borders. While there, you
    find that your prepaid coffee card doesn't have enough funds.
    As you sip your grande caff‚ mocha macchiato half soy quarter
    skim quarter 2% extra grande double vanilla pump no-whip
    coffeestrocity, you open your smart phone to top-off your
    prepaid card. You check that the site is HTTPS enabled and the
    connection is encrypted before you enter your username and
    password. Now that you've got your caffeine fix, you're ready
    to go about your day.

    Later on, you decide to double check your coffee card balance
    just to make sure the transaction went through and find that
    you have not only topped off your own card, but five or six
    others. What happened?


    [4] After being exploited three times in one day..

    ..you decide you have had enough and you shut down your
    computer, unplug your modem, remove the battery from your cell
    phone, disconnect your fridge from Twitter, delete your cat's
    Facebook account, trade your smart watch for a dumb one, wrap
    your house in tinfoil, and turn on your old tube TV. On the
    news, the anchor is talking about recent hacks that have
    compromised your health insurance company, your cell company,
    government agencies, and a particular scandalous website that
    you never heard of until it was breached. What happened?

    COMPLETE article:

    https://www.synopsys.com/blogs/software-security/top-hacking- techniques-of-2015/

    https://bbs.lc/BFjFQ



    --
    ../|ug

    --- OpenXP 5.0.51
    * Origin: A turtle that surfs the dark web. [o] A TORtoise (2:221/1.58)