Web-Books
in the Austria-Forum
Austria-Forum
Web-Books
Informatik
The Future of Software Quality Assurance
Page - 250 -
  • User
  • Version
    • full version
    • text only version
  • Language
    • Deutsch - German
    • English

Page - 250 - in The Future of Software Quality Assurance

Image of the Page - 250 -

Image of the Page - 250 - in The Future of Software Quality Assurance

Text of the Page - 250 -

250 K. Yorkston count[email removed] was hacked, because I sent message you from it. Now I have access to you accounts! For example, your password for [email re- moved] is [password removed] Within a period from July 7, 2018 to Septem- ber 23, 2018, you were infected by the virus we’ve created, through an adult website you’ve visited. So far, we have access to your messages, so- cial media accounts, and messengers. Moreover, we’ve gotten full damps of these data. We are aware of your little and big se- crets...yeah, you do have them. We saw and recorded your doings on porn websites. Your tastes are so weird, you know.. But the key thing is that sometimes we rec- orded you with your webcam, syncing the re- cordings with what you watched! I think you are not interested show this video to your friends, relatives, and your intimate one... Transfer $700 to our Bitcoin wallet: [Bitcoin wallet removed] If you don’t know about Bitcoin please input in Google “buy BTC”. It’s really easy. I guarantee that after that, we’ll erase all your “data” :D A timer will start once you read this mes- sage. You have 48 hours to pay the above- mentioned amount. I wonder if the author had a competitive salary and dental plan? Compromise allows the attackers to control the situation. I have something you don’t want released (your photos from your phone/compromising browsing history/bank accountdetails)andforsomeconsideration(cash/aconfidentialreport fromyour organisation) the problemmight goaway. Ego—sometimes, the urge to be “the smartest person in the room” can take over. It could be childhood dreams (such as reading of the exploits of Kevin Mitnick or Kevin Poulsen, both security experts arrested for hacking) and imagining “If only . . .”, or it could be the need to, like many conspiracy theorists, be the only person“whoknows the truth”. Some of the tools the attacker will use are fear, greed and even empathy. Chris Hadnagy and Michelle Fincher wrote the book Phishing Dark Waters [1] where they took an in-depth study of phishing. An attacker can use fear, such as the example above, or the alert from “your bank” saying your account has been hacked, and you should click the link below to “verify your password”. They can use greed—the Spanish prisoner/Nigerian 419 scam—where the victim is asked to “please make a small payment/give me access to your account to release the
back to the  book The Future of Software Quality Assurance"
The Future of Software Quality Assurance
Title
The Future of Software Quality Assurance
Author
Stephan Goericke
Publisher
Springer Nature Switzerland AG
Location
Cham
Date
2020
Language
English
License
CC BY 4.0
ISBN
978-3-030-29509-7
Size
15.5 x 24.1 cm
Pages
276
Category
Informatik
Web-Books
Library
Privacy
Imprint
Austria-Forum
Austria-Forum
Web-Books
The Future of Software Quality Assurance