Cyber Attacks. Different types of Cyber Attacks for stealing your data. Cyber security tips.

             Cyber Attacks. Different types of Cyber Attacks for stealing your data. Cyber security tips.

Cyber Attacks. Different types of Cyber Attacks for stealing your data. Cyber security tips.
               
               Over time, hackers have definitely become a lot smarter and they are far more persistent and that means businesses and government departments have had to build up their own defenses to try to stop them.

Ethical hacking is now one of the most common forms of hacking and you can become a certified ethical hacker, also known as a whit hat hacker. White hats use exactly the same techniques as the black hats use but they do it to find the vulnerabilities in a system and then fix them or tell the company concerned so they can get them fixed. But there are some attacks performed by black hat hackers to steal your data and break your system security.



( The information contained within this post is for educational and entertainment purposes only )


   Some Cyber Attacks or Hacking terms you should know:



●    Phishing – phishing is a way of hacking into accounts online, such as email, social media, etc. A fake page is made that looks like the official login page and when you open it, it looks the same as it should. Check the URL to see – most genuine sites have SSL encryption and will start HTTPS (not http).

●    Tabnapping – if you have multiple tabs open on your browser, it is possible for your account to be hacked. In an attack of this type, the victim will click on a link from another website, for example, let’s assume I have sent you a link to Twitter via a message. You click on that link and you also have a few other tabs open on your browser, the hacker replaces the Twitter page with a fake page. You would think your account has been logged out; you go and log back in and your account details are forwarded to the hacker.



●    Desktop Phishing – This is a more advanced form of phishing, much the same as the first method but instead of the URL being replaced with a fake one, your computer will be affected. When you try to open a page from a link sent to you, a fake page opens but the URL remains the same as it should be, making it very difficult to detect just by looking. If you are using a proper browser, it should detect the phishing method and warn you though.

●    Software Keylogger – This is a piece of software that will go every single keystroke on your keyboard and send it back to the hacker. They can determine what your online account details are and use them for their own purposes.

●    Hardware Keylogger – This is a hardware device, which must be connected to the computer for the keystrokes to be logged. The most commonly used one is for credit card details.

●    Brute Force Attack – Brute Force attacks are used for hacking passwords although it is a very time consuming method and tends to work better for those who use common passwords. The hacker has to guess at the password and just keep inputting their guesses.




●    Wordlist Attack – Similar to the brute force, but the hacker must first generate a list of words and save them to the software used by the hack. Those words are then applied until the right combination is found.



●    Encryption – This describes how data and passwords are stored, i.e. in encrypted format so they cannot be easily read by hackers.

●    Ransomware – Ransomware is a code program used by hackers to encrypt an entire hard disk and then ransom it, i.e. ask you for money to release the data.

●    IP Address – IP is a shortened version of Internet Protocol and an IP address is the address, which relates to your device. It can be a private IP or a public.

●    VPN – A VPN or Virtual Private Network is a method by which we can hide our identity online and change the IP address our computer uses to access the internet.

●    Web Server – A web server is basically a computer where website files are stored and retrieved when a website is accessed.



●    DoS Attack – This means Denial of Service and this kind of attack is usually used to bring a website down and make it unavailable. It is done by flooding the website with fake traffic so it goes well over the bandwidth limit and crashing the server. A firewall is the best form of defense against a DoS attack.

●    DDoS Attack – This means a Distributed Denial of Service attack. With a DoS attack, there is a single device but with a DDoS attack, there are multiple fake devices. A firewall will work but it has to be a specific type of firewall such as Cloudflare CDN.

●    SQL Injection – SQL injection attacks are used to inject queries into website databases, thus hacking the details and data stored on it.

●    Social Engineering – This kind of attack is where a person is duped into providing their account details or other sensitive information.

Thanks for Reading, share this if you liked.

Note: If you have any complaint with respect to any content in this post, please contact us.

Post a Comment

6 Comments

Emoji
(y)
:)
:(
hihi
:-)
:D
=D
:-d
;(
;-(
@-)
:P
:o
:>)
(o)
:p
(p)
:-s
(m)
8-)
:-t
:-b
b-(
:-#
=p~
x-)
(k)

Want your Article to publish here?. Contact us.

|| Copyright © EMOANAS.COM || 2017-2019 ||