CURRENTLY ON AIR ⇒
  • NEWS
    Monday, 7:00 pm - 7:30 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

What Are We Leaving Behind – Part 5

What Are We Leaving Behind – Part 5

Earth is an Amanah What Are We Leaving Behind? We've talked about waste, water, cleanliness, and our role as khalifah. But today we ask the deepest question of all: When we leave this earth – and we will leave it – what will we leave behind? What will be written in...

read more
Cleanliness is Half of Faith – Part 4

Cleanliness is Half of Faith – Part 4

Earth is an Amanah Cleanliness is Half of Faith We've talked about waste, food, and water. Today we talk about something we see every day — outside our homes, our masjids, our schools. We talk about litter. We talk about rubbish in our streets. We talk about the...

read more
Water: A Sacred Resource – Part 3

Water: A Sacred Resource – Part 3

Earth is an Amanah Water: A Sacred Resource So far we've discussed our role as khalifah and the sin of wastefulness. Today we talk about water — the substance that makes up 60% of our bodies, the key to all life, and one of the most neglected amanah in our daily...

read more
Breaking the Culture of Excess – Part 2

Breaking the Culture of Excess – Part 2

The Earth is an Amanah: Live Like It Matters Breaking the Culture of Excess Yesterday we discussed that we are khalifah – stewards of the earth. Today we get practical. We open our fridges, our shopping bags, and our bin lids. Because the place where most...

read more
The Islamic Perspective on the Environment – Part 1

The Islamic Perspective on the Environment – Part 1

The Earth is an Amanah: Live Like It Matters The Islamic Perspective on the Environment This week Wednesday the 22nd of April is International Mother Earth Day. Our theme for this week is: "Earth Is an Amanah – Live Like It Matters." Today, we begin with a question:...

read more
Default Bias – Part 5

Default Bias – Part 5

Invisible Forces that Shape our Day Default Bias This is our final day exploring invisible forces that shape our day. We have covered routines, social contagion, the decoy effect, and the spotlight effect. Today we conclude with a force that is perhaps the most subtle...

read more

Subscribe to our Newsletter

0 Comments