Espionage (Leslie)
Technology
Spyware
Malware
Adware
Phishing
Botnet
Logger
Keystroke
Monitor
Wi-fi Tools
Using localized networks
Using Mobile tech
Using tablets
Software
Updates
Customized Scripts
Loaded externally
Hacking
Trojans
Methods
Email
PDF attachments
Meeting Requests with Attachments
DOC attachments
Picture attachments
Software updates
USB/external devices
Employees
Contractors/Consultants
Outsiders with Access
Peer-to-Peer networks
Cyber Terrorism (Joe)
Methods
Sabotage
Internal
Planting a Mole
Disgruntled Employee
External
Activists
Terrorist Groups
State Actors
Website Defacement
Send Message
Publicity
Denial of Service
Deter Communication
Suspend System Activity (permanently or temporarily)
Technology
Wired
Internet
Exploiting Defaults
Faulty IIS (Internet Information Service)
Data Mining
Authorization Bypass
Software
Trojan Horse
Virus
Worm
Hardware
Stealing Password
Dictionary Attacks
Hybrid Attacks
Brute Force Attacks
Email
Man-in-the-Middle
Phishing
DNS hijacking
URL manipulation
Wireless
Eavesdropping
Interference
Packet Sniffing
Cyber Identity Theft (Laura)
Technology
Malware
Trojans
Spyware
Worms
Bots
Botnets
Rootkits
Viruses
Exploit tools and kits
ZeuS
Email harvesters
Precedents
Bluetooth-enabled devices planted at gas pumps to read credit card details
Data breaches at large companies (TJ Maxx, Heartland, ...)
Pharmamed.php (email harvesting)
Bluesnarfing, bluebugging, HeloMoto
Methods
Computers
Hacking
War-driving
Eavesdropping
Password-based attacks
Compromised-key attacks
Man-in-the-middle attacks
Sniffers
Physical acquisition
Stealing devices
Acquiring improperly disposed-of device
Phishing
Pharming
Mass rebellion
P2P services
Disclosure by employees
Disgruntled employees
Bribery
Unintentional disclosure
Posing
Scam within a scam
Posing as authority, mass-emailing victims of past identity theft
Spoofing
Pranking
Registering another person for a dating site, for example
Mobile devices
Hacking
War-dialing
Eavesdropping
Password-based attacks
Sniffers
Bluebugging and bluesnarfing
Phishing
Smishing
Disclosure by employees
Disgruntled employees
Bribery
Unintentional disclosure
Physical acquisition
Stealing devices
Acquiring improperly disposed-of device
Direct observation
Looking over the user's shoulder
Camera/video capabilities on devices
ATM skimming
Predictions (2011)
Exploitation of mobile GPS location information
More attacks on social networking sites
Increase in "mixed threats" (email, Web, social media)