CURRENTLY ON AIR ⇒
  • Interviews, Current Affairs
    Friday, 8:05 am - 9:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Beyond Emergency Aid – Part 4

Beyond Emergency Aid – Part 4

Compassion Without Borders Quick Recap - “Global Crises, Local Responses” Global suffering — whether in Palestine, Yemen, Syria, or refugee camps — reminds us that hardship has no borders. Islam teaches that believers are one body: when one part hurts, all must feel...

read more
Global Crises, Local Responses – Part 3

Global Crises, Local Responses – Part 3

Compassion Beyond Borders Quick Recap – Faith in Action Humanitarianism is not a modern concept but is deeply rooted in Islam. The Holy Qur’an and Sunnah teach that serving others, relieving suffering, and showing mercy are acts of worship. Allah describes the Prophet...

read more
Faith in Action – Part 2

Faith in Action – Part 2

Compassion Without Borders Quick Recap World Humanitarian Day (19 August - today) honours those who serve humanity in times of crisis and reminds us that true compassion has no limits. The theme “Compassion Without Borders” emphasizes that kindness should extend...

read more
Compassion Without Borders – Part 1

Compassion Without Borders – Part 1

World Humanitarian Day Compassion Without Borders Every year on 19 August, the world pauses to mark World Humanitarian Day, a time to recognize those who dedicate their lives to serving others, often in the most difficult and dangerous conditions. It is also a day to...

read more
Proving Independence – Part 7

Proving Independence – Part 7

The Real Muslim Women Quick Recap - A Woman’s Place is the Home It argues that a woman’s primary place, according to Islamic teaching, is the home, where she nurtures children and manages family life. Islam frees her from the financial responsibility of providing for...

read more
Home, Sweet Home – Part 6

Home, Sweet Home – Part 6

The Real Muslim Women Quick Recap – The Muslim Housewife The role of the Muslim housewife is often reduced to stereotypes, but in reality, it is complex, powerful, and deeply personal. For some women, being a housewife is a conscious, fulfilling choice rooted in faith...

read more

Subscribe to our Newsletter

0 Comments