The Browser in the Browser (BitB). This technique is a different version of the traditional phishing that many users already know how to detect.
Using the Browser in the attack, cybercriminals create what appears to be a pop-up from a legitimate service. Although false, it has been generated safely within the Browser. How? Adding to the fraudulent page, a fake address bar in the form of an image appears legitimate.
It’s basically like when we take a screenshot of a website and, when we see the image from our gallery, we confuse it with the website itself and clumsily try to click on one of the page’s utilities, which clearly doesn’t take us anywhere.
Only, in this case, the part in which the credentials are entered is active, sending them to the cybercriminal once they have been joined; this cyber-attack is more design than technique.
In order not to fall into the trap of this new technique, we must:
In this article, we will guide you on how to use WhatsApp's multi-device feature. Many… Read More
People suffering from hypothyroidism have a slower metabolism, and even if they have a low… Read More
In a world where data security and control of IT resources are paramount, private clouds… Read More
Today, businesses constantly have to adapt to new market conditions and requirements. This is especially… Read More
Did you know that external positioning factors, those that you cannot control directly on your… Read More
WhatsApp is an essential communication tool but can be vulnerable to unauthorized access. Learn how… Read More