CURRENTLY ON AIR ⇒
  • Quran Recitation
    Saturday, 3:30 am - 6:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Supporting Elderly Without Family – Part 5

Supporting Elderly Without Family – Part 5

Community Responsibility Towards Elderly Quick Recap - Youth’s Duty Towards Elders Islam teaches that youth must honour, respect, and serve elders as part of their faith. The Prophet ﷺ said: “He is not one of us who does not show mercy to our young and respect to our...

read more
Youth’s Duty Towards Elders – Part 4

Youth’s Duty Towards Elders – Part 4

Community Responsibility Towards Elders Quick Recap - Addressing the Needs of Elders in the Community Caring for elders is a central responsibility in Islam, emphasized in both the Qur’an and Sunnah. As people age, they face physical, emotional, and spiritual...

read more
Addressing the Needs of Elders – Part 3

Addressing the Needs of Elders – Part 3

Community Responsibility Towards Elders Quick Recap - Elders as a Source of Wisdom and Guidance In Islam, elders are far more than just recipients of care; they are invaluable living libraries of wisdom and guidance for the entire community. Their long lives, filled...

read more
A  Source of Wisdom and Guidance – Part 2

A Source of Wisdom and Guidance – Part 2

Community Responsibility Towards Elders Quick Recap - A Divine Command and a Global Commitment The International Day of Older Persons (October 1st) is a global initiative to honor elders and address the challenges of aging. For Muslims, this modern call to action...

read more
A Divine Command and a Global Commitment – Part 1

A Divine Command and a Global Commitment – Part 1

Community Responsibility Towards Elders A Divine Command and a Global Commitment October 1st - International Day of Older Persons Every year on October 1st, the world observes the International Day of Older Persons. Established by the United Nations in 1990, this day...

read more
The Quest for a World Without Nuclear Weapons – Part 5

The Quest for a World Without Nuclear Weapons – Part 5

Nuclear Weapons Quick Recap - who has nuclear weapons and the double standards Nine countries are known or believed to have nuclear weapons. The United States, Russia, China, France, and the United Kingdom are officially recognized under the Nuclear Non-Proliferation...

read more

Subscribe to our Newsletter

0 Comments