CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Thursday, 10:05 pm - 4:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The Sacred Months

The Sacred Months

In Islam, time is not just a neutral passage of moments — it carries weight, meaning, and divine wisdom. Among the twelve months of the Islamic calendar, four are known as the Sacred Months (Al-Ashhur Al-Hurum). These months were honoured even before Islam and have...

read more
The Structure of the Hijri Calendar

The Structure of the Hijri Calendar

The Hijri or Islamic calendar is a lunar calendar composed of 12 months based on the cycles of the moon. Unlike the Gregorian calendar, which is solar and aligns with the earth’s journey around the sun, the Islamic calendar follows the phases of the moon — from one...

read more
The Islamic Calendar

The Islamic Calendar

The Origins of the Islamic Calendar The Islamic, or Hijri, calendar is more than a way to track time — it is a spiritual compass that guides Muslims through the rhythms of worship, remembrance, and reflection. Unlike the Gregorian calendar, which is solar-based, the...

read more
Right to Return

Right to Return

The right to return is more than a political demand for millions of Palestinians — it is a deeply personal and collective struggle for justice, identity, and dignity. Seventy-five years since the Nakba of 1948, when over 700,000 Palestinians were forcibly displaced,...

read more
Longest Refugee Crisis

Longest Refugee Crisis

Generations in Exile: The Longest Refugee Crisis in Modern History The Palestinian refugee crisis is not only one of the largest and most politicized in modern history — it is also the longest-running. Since 1948, when over 700,000 Palestinians were forcibly displaced...

read more
Types of Refugees

Types of Refugees

The word “refugee” often evokes images of families fleeing conflict, seeking shelter across borders. But not all refugees face the same challenges or legal circumstances. While the general concept refers to someone forced to flee their home for safety, there are...

read more

Subscribe to our Newsletter

0 Comments