Socioengenering

emotions / feelings. curiosity - greedy - fear - compassion

lost my pass help me please pendrive with selaries data / free gadgets /

using the celebrities to support con

damage the computer and offer the help

business email compromise - spoofed account number

data breach and using the password for the balckmail

Privacy vs. Security

OSINT

aps.edu.pl • Hunter

PIG BUTCHERING

PASSWORD

Password Strength Meter (1)

2FA

image.png

Backup:

The 3-2-1 Rule in Theory

3 – Keep 3 copies of important files.

2 – Store the files on at least 2 different types of storage media.

1 – Keep 1 copy offsite (outside your office or home).

<aside> ✉️

The most important password for email.

</aside>

Having access to facebook you have also to messenger and then ask friends for "loan"with BLICK


FIRST-PARTY COOKIES / THIRD -PARTY COOKIES

<aside> 🦹🏻

Hackers

7261e6fbae202ea78e7ce3d9b8eade25e24d1aa3ffcf470f522b2b38a2895b01.jpg

</aside>

<aside> 🎣 Phishing - fake web pages General fishing. / Spear fishing. / Whaling. / Smishing

SPAM SPIT SPIM

Shoulder Surfing

CATFISHING

</aside>

Botnet

DDos

<aside> <img src="/icons/chart-line_gray.svg" alt="/icons/chart-line_gray.svg" width="40px" />

OUR data and how reliable are the data on the internet

General Data Protection Regulation (RODO)

</aside>

🦠 What is VIRUS?

http://www.virustotal.com