Masquerading as a trustworthy person or business, phishers
attempt to steal sensitive financial or personal information
through fraudulent email or instant messages. Internet
Based Attacks While your computer is connected to the
I
nternet it can be subject to attack through your network
communications. Some of the most common attacks
include:
Bonk
–
An attack on the Microsoft TCP/IP stack that
can crash the attacked computer.
RDS_Shell
–
A method of exploiting the Remote Data
Services component of the Microsoft Data Access
Components that lets a remote attacker run commands
with system privileges.
Win Nuke
–
An exploit that can use NetBIOS to crash
older Windows computers.