"Attackers will often use a tool called a ‘web inject’ to monitor the internet browsing of an infected user. When the victim attempts to access their normal internet banking platform, the malware will
serve up a fake web page that looks exactly like their real online banking web page. It will steal
the victim’s login details and password, and trick the user into entering their token authentication,
or SMS authentication, so that the attacker can quickly replicate the process on the genuine web
page in order to get access to (and steal from) the account." in Cyber crime: understanding the online business model, by Matt Carey
Head of London Operations Team, NCSC. Image by Monica Pinheiro, license CC BY-NC-SA (CC).
"More than conversation at the interface, it is creative assemblages like these that explore and elaborate the particular dynamic capacities that digital media afford and the ways that through them humans and machines can perform interesting new effects (...) in uniquely particular ways." Lucy Suchman (2009). Human-machine reconfigurations: plans and situated actions.
Nov 16, 2020
Nov 9, 2020
Nov 2, 2020
Subscribe to:
Comments (Atom)