Cross Site Scripting
Embedded HTML image object or JavaScript image tag in an email
Cross-site scripting
Validate input to remove hypertext
Pharming
user credentials into a fake website
RootKit
masking the activity of an on-going attack from the operating system
RootKit
conceals,can’t install without user interaction or automatically propagate
Vishing
Phishing applied with VOIP or telephone network (Voice Based)
SQL injection
‘or 1=1–, or1’=1–, ‘or1=1’– attack MOST likely occurring
Botnet
Command & Control