CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Wednesday, 10:05 pm - 4:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The Art of Disagreement – Part 3

The Art of Disagreement – Part 3

The Ties That Bind Quick Recap - The “Chosen Family” vs. The Family of Origin In adulthood, many people discover that family is not defined only by blood but by emotional safety, mutual support, and genuine care. Our families of origin give us roots, identity, and...

read more
Chosen Family vs Family of Origin – Part 2

Chosen Family vs Family of Origin – Part 2

The Ties That Bind Quick Recap -  The Changing Contract of Friendship in Adulthood As we enter adulthood, friendship changes in ways we don’t often acknowledge. Time becomes limited, responsibilities grow, and careers and family commitments intensify — making...

read more
The Changing Contract of Friendship in Adulthood – Part 1

The Changing Contract of Friendship in Adulthood – Part 1

The Ties That Bind The Changing Contract of Friendship in Adulthood: What Do We Owe Each Other When Life Gets Full? Friendship in adulthood is one of the most cherished yet least examined relationships we have. Unlike family ties or romantic partnerships, friendship...

read more
Health with Ronald

Health with Ronald

Stroke Welcome to our Friday Health, Fitness, and Wellbeing segment. This week is National Stroke Week in South Africa, a time dedicated to raising awareness about one of the leading causes of disability and death in the country. A stroke can happen to anyone — young...

read more
The Philosophy of Enough – Part 4

The Philosophy of Enough – Part 4

Modern Anxieties and the Pursuit of Quiet Quick Recap - The Geography of Stress Stress today isn’t just a personal issue — it’s shaped by the environments we live in, the systems we work under, and the expectations we carry within ourselves. Urban life keeps our...

read more
The Geography of Stress – Part 3

The Geography of Stress – Part 3

Modern Anxieties and the Pursuit of Quiet Quick Recap - Information Overload and the Crisis of Attention We live in an age of endless noise — where news, notifications, and updates compete constantly for our attention. While we’ve gained unprecedented access to...

read more

Subscribe to our Newsletter

0 Comments