V slideshow jsou ukázány tyto cesty (a malinko rozebírány):
- Email Social Engineering/Spear Phishing
- Infection Via a Drive-By Web Download
- USB Key Malware
- Scanning Networks for Vulnerabilities and Exploitment
- Guessing or Social Engineering Passwords
- Wifi Compromises
- Stolen Credentials From Third-Party Sites
- Compromising Web-Based Databases
- Exploiting Password Reset Services to Hijack Accounts
- Insiders