CURRENTLY ON AIR ⇒
  • The Conversation
    Thursday, 11:05 am - 12:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Tips to Enjoy

Today we continue with a few more tips on how to enjoy the holidays Develop and encourage a life of gratitude. Gratitude is an attribute that transcends circumstances. No matter what your circumstances, there are always many reasons to be thankful in them. Your...

read more
Holidays

Holidays

Tips to Enjoy For many of us, the holiday season is a time that is anticipated with both joy and anxiety. Sure, we love the freedom, the family time, and we cherish the memories of holidays gone by; but along with them, we add the stresses of preparation, expectations...

read more
Holidays and Travel

Holidays and Travel

As we continue with our focus on Holidays this week, many people look forward to travelling as a way of spending their holidays. While some stay at home and just take day trips to different places close to their home, there are others who book holidays far away from...

read more
Holidays

Holidays

The History of Holidays The Holidays are here! You can feel it, you can sense it, you can see it, you can even taste and smell it! Holidays gets everyone excited and the smiles are on everyone`s faces. Therefore, this week we will be focusing on different aspects...

read more
Reading the Report Card

Reading the Report Card

When kids bring home report cards, they may worry about how you’re going to react. And you may not always know the right thing to say. The truth is there isn’t one right thing to say. But it is important to look beyond grades. What you say (and how you say it) in each...

read more
A Colleague`s Response

A Colleague`s Response

Getting exam results is stressful, especially when the results are unexpected and less than hoped for. Although you may have the grades you need to get onto your chosen university course, some of your friends might not be in such a lucky position. They may be feeling...

read more

Subscribe to our Newsletter

0 Comments