黑客可以看到沃尔什赞过Change.org发布的一个页面。仅仅是这样,他们就构建了一些令人信服的点击诱饵。不到10分钟,他们伪造了一份来自Change.org的假电邮,请她在一份关于马林县土地利用的假请愿书上签名。
When that link led her to a page that asked her to enter her email address and password, shecomplied. To spare Mrs. Walsh any actual harm, the hackers used a service called Phish5, whichdoes not actually store passwords and is often used by employers to test employees’ ability tospot malicious phishing cons.
点击该链接后,她登上一个网页,要求她输入电邮地址和密码,她照做了。为了不让沃尔什遭受任何实质上的危害,黑客使用了一个名为Phish5的服务,它并不真正存储密码,雇主通常用它来测试雇员识别恶意仿冒内容的能力。
Had the two been actual attackers, they would have had all the information they needed to“pwn Mrs. Walsh — hacker speak for taking over someone’s digital life — from afar, particularlybecause, Mrs. Walsh confessed, she was guilty of using the same password across manyaccounts.
如果这两名黑客是动真格的,他们就已经远程获取了“pwn沃尔什所需的一切信息。“pwn是黑客的行话,指接管某人的数字生活。沃尔什承认,她在不同的账户上使用了同样的密码,而这让黑客入侵变得尤为轻松。
【即使远离网络 也难摆脱黑客攻击】相关文章:
★ 口渴的乌鸦
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15