Ads Top


With growing technology day by day we do have security problems which could end the meaning of privacy in the worldso, here are the 10 techniques used by hackers to get into our systems and steal our data.

Image result for hacker

  1.  Keylogging:

            Keylogging is a type of surveillance spyware that record messages, emails and keystrokes to a log file. That may contain passwords, Social security numbers, credit card data and easily can be sent to the hacker.

2. Denial of Service (DoS\DDoS):

A distributed denial of service (DDOS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
Those attacks often employ botnets, also called zombie computers which are systems that are taken over, sometimes unknowingly, by a hacker.

3. Waterhole attacks:

Hackers will take advantage of the face that their targeted victims often meet or work on particular physical or virtual location.
So they "poison" that location to achieve a malicious objective.
If companies have a local coffee shop that is popular with company employees. Hackers will create fake WAPs (WIFI Access Point)
Or maliciously modify a frequently visited website to do the same.

4. Fake wireless access points:

Using software and wireless network card hackers can set up a fake WAP (Wireless Access Point) which connects to the official public place WAP.
Hackers can sniff unprotected data that's transferred between the victims and their remote host, password too.
Some will ask you to make a new account to use their WAP, and then they'll use the same log on on popular websites.

5. Eavesdropping (Passive Attacks):

With a passive attack, computer systems and networks are monitored in order for a hacker to gain some information.
The point isn't to cause damage to the computers, but to harvest information as its transmitted, its also known as sniffing or snooping.

6. Phishing:

The Hacker sends an electronic message to an unsuspecting user under the impression that the message is from a trusted institution.
And the user is fooled into giving his information that might also include a username, passwords, social security number and bank account information.

7. Viruses (Active Attacks):

Active attacks, such as viruses and Trojans are techniques where a hacker manipulates or deletes data to create a desired result.
And a Trojan is simply a computer program that fools the user into thinking it's another kind of program and once installed, releases the malicious code.

8. ClickJacking Attacks:

ClickJacking also called a UI Redress attack is when a hacker uses several solid layers to fool a user into clicking the top layer without them realizing.
So this attacker "Hijacking" clicks that aren't meant for the exact page, but for a page where the hacker wants you to be.

9. Cookie theft:

When a hacker steals out cookies, they become authenticated to our website as if they were us and had supplied a valid log-on name and password.
Firefox browser add-on "firesheep" allows people to steal unprotected cookies from others. When used with a fake WAP. Even encrypted cookies can be stolen.

10. Bait and switch:

Bait and switch hacking involves running malicious content through the user believes he is running something standard.
Hackers create "free" content that can be downloaded and used by anyone. But then replaces the link that the victim looked at originally with a malicious link.

No comments:

Theme images by Storman. Powered by Blogger.