Page 36 - SEE40-Implementation-paper_EN
P. 36
Popular threats
W h a t y o u s h o u l d b e p a r t i c u l a r l y c a r e f u l a b o u t :
M a l w a r e
Software which is designed to damage your devices (PC, servers and so on). It includes:
trojans, viruses, worms, spyware, etc.
P h i s h i n g
This is a type of cyber attack in which scammers impersonate some well-known
institutions/person (banks, government agencies, work colleague, etc.) with the intention
of extracting your confidential data.
M a n - i n - t h e - m i d d l e a t t a c k
MITM is type of attack where hackers try to get in position between the victim and a
certain application (for example, a bank) and his purpose is to intercept your data and
remain unnoticed.
36
Icons made by Freepik from www.flaticon.com