CURRENTLY ON AIR ⇒
  • Panel Discussions
    Sunday, 11:05 am - 12:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Step 4 and 5 towards preparation for Ramadhan

Step 4 and 5 towards preparation for Ramadhan

4) Get the tongue into practice. While preparing for Ramadhan, you must also develop the habit of making dhikr. In the modern world, we tend to mimic technology by focusing on our minds and bodies’ performances while neglecting the most important side of us – our...

read more
Step 3 towards preparing for Ramadhan

Step 3 towards preparing for Ramadhan

Can you really move forward when you haven’t gotten over your past? Allah says in the Quran: وَتُوبُوٓا۟ إِلَى ٱللَّهِ جَمِيعًا أَيُّهَ ٱلْمُؤْمِنُونَ لَعَلَّكُمْ تُفْلِحُونَ “And all of you beg Allah to forgive you all, O believers, that you may be successful”...

read more
Step 1 and 2 towards preparing for Ramadhan

Step 1 and 2 towards preparing for Ramadhan

Some years ago, there was a vibe about the way Muslims approached the holy month of Ramadhan. Preparing for the blessed month had its own charm, its own flavour. But life has become so haphazard, so messy in the 21st century that we have forgotten the traditions of...

read more
Ramadhan: An Important guest

Ramadhan: An Important guest

If Sha`baan caught you off guard, then what are the chances that Ramadhan won`t do the same? The greatest catastrophe is not preparing or not preparing adequately for an important event. Now the problem which we have is many of us do not deem it to be necessary to...

read more
Preparing for Ramadhan

Preparing for Ramadhan

Importance of Preparing the Soul for Ramadhan Firstly, understand this: “We are not ONE but TWO.” This doesn’t mean we aren’t ONE as an Ummah, that we are. What is meant that each one of us is NOT just made of a human body. In fact, the human body is only the vessel -...

read more
Unfortunate People & What to do?

Unfortunate People & What to do?

Allah, the Lord of the Worlds, is most kind, compassionate, merciful and benevolent to His servants. The Noble Quraan and Ahaadith are full with verses that explain this most beautiful quality of Allah, in fact, the very first verse that we find when we open the...

read more

Subscribe to our Newsletter

0 Comments