Which of three (3) these approaches could be used by hackers as part of a Business Email Compromise attack?
Answers
Answered by
6
Approaches could be used by hackers as part of a Business Email Compromise attack:
- Once the hacker chooses which company to attack, they attack the company's email setting through a range of approaches that is social engineering, brute force, malware, key loggers, or spear phishing
- Business e-mail compromise occurs when hackers hack into a corporate e-mail account and mimic the real owner to deceive the company, its customers, partners, and/or staff into sending money or sensitive data to the attacker's account.
I hope it helped..
Similar questions