Hacker Personas: The Impersonator

A Deeper Look Into Cybercrime

Published March 2021

X

Today’s cybercriminals are masters at exploiting basic human trust and impersonators have unfortunately perfected this technique. Pretending to be someone else, these hackers rely on vulnerabilities to manipulate their victims into opening doors to systems or unwittingly sharing sensitive data such as passwords or banking details. What makes this type of cybercriminal a massive threat is their expert ability to hide in plain sight, often masking their true intentions behind seemingly innocuous requests or legitimate-looking websites.

Don't forget to Sign In or Sign Up to Download

OR

Sign up
TO DOWNLOAD

You can update your preferences, unsubscribe or delete your account at any time by logging into the site, or via the links at the bottom of any of our emails.

Biting the hand that feeds IT © 1998–2021