fbpx
CURRENTLY ON AIR ⇒
  • Kalimatul Huda, Hfz Husain Wadee
    Sat, 1:05 pm - 2:00 pm
    [ - ]

feedback@radioislam.org.za

Radio Islam Logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

Dec 02, 2021

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Points to consider – Part 5

Points to consider – Part 5

Important Points for a Muslim to Consider in Summer So many of us complain about how hot it is and how long the days are, but unfortunately there are very few of us who actually take benefit and use these hot and long days to our advantage. Here are a few important...

read more
Healthy foods for summer – part 4

Healthy foods for summer – part 4

Healthy summer foods to beat the heat and boost health Summer brings with it fresh fruits and vegetables that are a delight to devour during the intense heat, and they come with the added benefit of being healthy for your body. It`s hot, scorching and sweaty days and...

read more
Benefits of Summer – Part 3

Benefits of Summer – Part 3

Sunny skies and rising temperatures do more than make our environment a pleasant place. They also provide some very significant benefits to our health and wellbeing. Sunlight helps to regulate almost all our bodily processes, as well as acting as a psychological...

read more
An Amazing Hadith about Summer – Part 2

An Amazing Hadith about Summer – Part 2

عَنْ أَبِي هُرَيْرَةَ، عَنِ النَّبِيِّ صلى الله عليه وسلم قَالَ ‏"‏ إِذَا اشْتَدَّ الْحَرُّ فَأَبْرِدُوا بِالصَّلاَةِ، فَإِنَّ شِدَّةَ الْحَرِّ مِنْ فَيْحِ جَهَنَّمَ وَاشْتَكَتِ النَّارُ إِلَى رَبِّهَا فَقَالَتْ يَا رَبِّ أَكَلَ بَعْضِي بَعْضًا‏.‏ فَأَذِنَ لَهَا...

read more
Why New Resolutions so Often Fail – Part 3

Why New Resolutions so Often Fail – Part 3

So we began the discussion yesterday on why so many of our new resolutions fail – why they are somewhat easy to make, yet so hard to follow through with. Today we will take you through a few more reasons why these resolutions don’t see the end of January. “Instead of...

read more

Subscribe to our Newsletter

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *