Subj : attacks.. what happened? To : All From : August Abolins Date : Mon Mar 28 2022 04:37 pm An oldie.. but may still be worth comparing it to 2022. "The top hacking techniques of 2015 and how they work "Posted by Jamie Boote on Monday, December 14, 2015 [1] Reflected file download (RFD) Let's say that one morning you wake up and try to print some last minute work notes out on your home printer. Without luck, you decide to re-install the print driver. While browsing the Internet, looking for a driver, you find that someone has linked to a file on a forum that may suit your needs. As a good internet user, you check where the link really leads and find that it does point to a legitimate site. You click and run the file; however, your computer is compromised and an attacker gets in. What happened? [2] Autonomous carjacking After getting tricked into downloading a file you shouldn't have, you're already late for work. During your drive, without warning, the AC turns up to full blast, the radio begins playing, and the transmission stops transmitting power. Your car just got hacked. This is the new reality of ever-smarter cars. As cars stop resembling the mechanical carriages of years past and start looking more and more like fly-by-wire fighter aircraft, more and more systems are controlled by computers. With cars acting as mobile hotspots, the barrier to unauthorized entry is lowered dramatically. What happened? [3] The POODLE attack After somehow regaining control of your car, you drive into the nearest coffee spot and reflect on how it was once illegal to send encryption technology outside US borders. While there, you find that your prepaid coffee card doesn't have enough funds. As you sip your grande caff‚ mocha macchiato half soy quarter skim quarter 2% extra grande double vanilla pump no-whip coffeestrocity, you open your smart phone to top-off your prepaid card. You check that the site is HTTPS enabled and the connection is encrypted before you enter your username and password. Now that you've got your caffeine fix, you're ready to go about your day. Later on, you decide to double check your coffee card balance just to make sure the transaction went through and find that you have not only topped off your own card, but five or six others. What happened? [4] After being exploited three times in one day.. ...you decide you have had enough and you shut down your computer, unplug your modem, remove the battery from your cell phone, disconnect your fridge from Twitter, delete your cat's Facebook account, trade your smart watch for a dumb one, wrap your house in tinfoil, and turn on your old tube TV. On the news, the anchor is talking about recent hacks that have compromised your health insurance company, your cell company, government agencies, and a particular scandalous website that you never heard of until it was breached. What happened? COMPLETE article: https://www.synopsys.com/blogs/software-security/top-hacking- techniques-of-2015/ https://bbs.lc/BFjFQ -- ../|ug --- OpenXP 5.0.51 * Origin: A turtle that surfs the dark web. [o] A TORtoise (2:221/1.58) .