- Mastering Reverse Engineering
- Reginald Wong
- 122字
- 2021-06-10 19:40:26
Malware sent as an email delivery would require the recipient to open the attached file. The email is crafted in such a way that the recipient becomes curious about opening the attachment. These unsolicited emails that are spread to many addresses are called email spam. They usually contain a subject and a message body that uses social engineering to get the recipient's attention and eventually have them execute the malware. An example of this can be seen in the following screenshot:
Activities that deceive a person or a group of people to do an activity is called social engineering . With poor security awareness, users may fall into this famous proverbial trap: curiosity killed the cat .
推薦閱讀
- CTF實戰:技術、解題與進階
- Kali Linux Network Scanning Cookbook(Second Edition)
- Kali Linux Wireless Penetration Testing Cookbook
- 數據保護:工作負載的可恢復性
- 編譯與反編譯技術實戰
- 數據安全架構設計與實戰
- CTF快速上手:PicoCTF真題解析(Web篇)
- 復雜信息系統網絡安全體系建設指南
- Android Application Security Essentials
- 黑客攻防入門
- 紅藍攻防:技術與策略(原書第3版)
- Developing Applications with Salesforce Chatter
- 大中型網絡入侵要案直擊與防御
- AI+網絡安全:智網融合空間體系建設指南
- 數據安全實踐:能力體系、產品實現與解決方案