paint-brush
Most popular types of cyber attacks against individual users, part Iby@gershwin.aaron
2,361 reads
2,361 reads

Most popular types of cyber attacks against individual users, part I

by Aaron Gershwin6mMay 23rd, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

There is a law that is named after a famous bank robber, — it’s called Sutton’s law. After Willie Sutton was caught, a reporter asked him a simple question, why do you rob banks? “Because that’s where the money is” he answered. Sutton’s law states that when confronting a problem, the most obvious solution should be applied first. It is used in medicine, philosophy, computer programs debugging, but let’s apply this to the field of cybersecurity.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Most popular types of cyber attacks against individual users, part I
Aaron Gershwin HackerNoon profile picture
Aaron Gershwin

Aaron Gershwin

@gershwin.aaron

Cyber security copy writer, tech support with a degree in political science

Learn More
LEARN MORE ABOUT @GERSHWIN.AARON'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Aaron Gershwin HackerNoon profile picture
Aaron Gershwin@gershwin.aaron
Cyber security copy writer, tech support with a degree in political science

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite