Improper Usage

Park your car at a legitimate parking lot in the street. What's wrong? Even it is a legitimate parking zone, the permitted usage restricts to bus only. Similarly in the cyber world, proper usage is essential to stay secure. Examples are software license (commercial or personal; by device or user; internal or Internet facing application), penetration tools (for authorized  assessment or malicious purpose), specific hardware (prohibit for re-export to 3rd party) etc....
Read More

Masquerade

Bison is masqueraded as swan. This is a typical trick in social engineering attack.  That's why scams in social network, email invite etc. are so successfully. So, connect only those who you meet face-to-face with their social ID exchanged on the spot, never trust email inviting you to click links for recovery of access or incentive. If the scenario matches with what you need, validate with the sender first to stay secure....
Read More