The cyber threat landscape – how do others get attacked?
Security is always a game of cat and mouse. Adversaries are constantly learning new tricks and developing new attacks, both on the technical and social engineering sides. For example, let’s consider credit cards. In the mid-nineties, fake number generators were a major problem. To defend against this, credit card companies introduced ways to verify numbers in real time, so attackers had to find a way to capture real numbers online via fake websites. Credit card companies again smartened up and set up further protections to prevent captured credit cards from being used. As such, adversaries are now using credit card skimmers to physically copy and clone cards. This constant back and forth is also occurring on a different scale and impacting not only individuals, but organizations and governments too. Remember, the technological advancements we are currently experiencing are not used exclusively by law-abiding individuals...