Blackhat: Installing a Keylogger
A hacker sends a company employee a fraudulent email prompting him to change his password. The employee downloads a PDF, which is a keylogger posing as password security guidelines. Once the keylogger has been downloaded, the hacker gets the employee's credentials and logs into the system.
Public Discussion Questions
Why should we be careful about downloading files from unknown sources?
Public Pause Prompts
|00:13||What do you think will happen now that he has downloaded this file?||Timed||00:30|