Malboard attack

Malboard attack:- This attack was discovered by group of academics, this attack can be used to mimic a user's identity through their keystrokes.

                                                                  Warshipping

Warshipping attack:- Warshipping is a new form of existing hacking method such as wardialing and wardriving. This attack technique can allow threat action to disrupt business operations and steal sensitive data. Under this attack, the hacker needs to on their 3G-enabled device at the bottom of a packing box to gain access to a victim's network.

                                                        Spearphone attack

Spearphone attack:- Spearphone is a new type of attack that can enable threat actors to eavesdrop on people's mobile phone calls. The attack makes use of android devices on-board accelerometers to infer speech from the devices speakers. The attack was successfully tested on several android models- LG G3, Samsung Galaxy Note 4 and Samsung Galaxy S6.

                                                         Minerva attack

Minerva attack:- Minerva is a lattice-based cryptography attack that can recover private keys from cryptographic libraries. It is based on the timing leakage of the bit-length of nonces used in ECDSA and other signature algorithms. Older ID Protect smart cards along with wolfSSL, MatrixSSL, Crypto++, Oracle SunEC, and Libgcrypt crypto libraries are vulnerable to attack.

                                                             PDFex attack

PDFex attack:- This attack was discovered by german academics it is a new attack that could be used to steal data from encrypted PDF files. This attack was successfully tested against 27 desktop and web PDF viewers. This includes popular Software such as Adobe, Acrobat, Foxit Reader, Evince, Nitro and chrome and Firefox build in PDF viewers.

                                                                     WIB attack

WIB attack:- It is a new SIM card attack that is similar to the simjacking attack.This attack leverages vulnerabilities in wireless internet browser (WIB) apps to attack user's devices, in order to exploit WIB apps attackers need to send a specially formatted binary SMS(Called an OTA SMS) that will execute STK (SIM TOOLKIT) instructions on SIM cards