CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Thursday, 10:05 pm - 4:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Has the Digital Age made us Lazy – Part 3

Has the Digital Age made us Lazy – Part 3

Literacy in the Digital Age Quick Recap – From Books to Screens For centuries, people mainly read from printed materials like books and newspapers. With the invention of e-readers, smartphones, and the internet, reading has increasingly moved to digital platforms....

read more
From Books to Screens – Part 2

From Books to Screens – Part 2

Literacy in the Digital Age Quick recap – History and Importance International Literacy Day, established by UNESCO in 1967, serves as a global reminder that literacy is a fundamental human right and a critical cornerstone of dignity, development, and societal...

read more
International Literacy Day

International Literacy Day

Literacy in the Digital Age History, Importance and Intro Since 1967, September 8th has been recognized globally as International Literacy Day, a cornerstone initiative established by UNESCO to remind the public of the profound importance of literacy as a matter of...

read more
The Sunnah of Activism

The Sunnah of Activism

Quick Recap – The Archer`s Aim Islamic activism is built on a non-negotiable principle: Allah is pure and accepts only what is pure. Noble goals can never justify corrupt means, whether in fundraising, alliances, or conduct. The Prophet’s ﷺ analogy of the traveller...

read more
The Archer’s Aim – Part 9

The Archer’s Aim – Part 9

The Sunnah of Activism Quick Recap – Activism with Adab Islamic activism is more than reactionary protest — it is a holistic framework rooted in revelation, noble character, and sincere goodwill (nasīḥah). Worship itself trains believers in ethics: prayer restrains...

read more
Islamic Etiquette in Activism – Part 8

Islamic Etiquette in Activism – Part 8

The Sunnah of Activism Quick Recap – Gold or Men? Beyond Wealth and Status In Islam, the greatest asset in community service and activism is not wealth, but people. The Prophet ﷺ compared humanity to a hundred camels among which only one is fit for a journey,...

read more

Subscribe to our Newsletter

0 Comments