{"id":59975,"date":"2021-12-02T09:00:57","date_gmt":"2021-12-02T07:00:57","guid":{"rendered":"https:\/\/radioislam.org.za\/a\/?p=59975"},"modified":"2021-12-01T12:26:59","modified_gmt":"2021-12-01T10:26:59","slug":"types-of-attacks-part-4","status":"publish","type":"post","link":"https:\/\/radioislam.org.za\/a\/types-of-attacks-part-4\/","title":{"rendered":"Types of Attacks &#8211; Part 4"},"content":{"rendered":"<p>In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.<\/p>\n<p><strong>4. Phishing:<\/strong><br \/>\nThe attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"59976\" data-permalink=\"https:\/\/radioislam.org.za\/a\/types-of-attacks-part-4\/cpu1\/\" data-orig-file=\"https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/12\/cpu1.jpg?fit=400%2C280&amp;ssl=1\" data-orig-size=\"400,280\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cpu1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/12\/cpu1.jpg?fit=400%2C280&amp;ssl=1\" class=\"size-medium wp-image-59976 alignnone\" src=\"https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/12\/cpu1.jpg?resize=300%2C210&#038;ssl=1\" alt=\"\" width=\"300\" height=\"210\" srcset=\"https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/12\/cpu1.jpg?resize=300%2C210&amp;ssl=1 300w, https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/12\/cpu1.jpg?w=400&amp;ssl=1 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.<\/p>\n<p><strong>5. Eavesdropping:<\/strong><br \/>\nAttacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:<br \/>\n1. Email monitoring<br \/>\n2. Which websites you visit<br \/>\n3. What items you download<\/p>\n<p><strong>6. SQL injection:<\/strong><br \/>\nAs the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else&#8217;s username and password.<\/p>\n<p><strong>7. Password attack:<\/strong><br \/>\nTo crack a password or find a password, hackers employ the following techniques:<br \/>\nDictionary attack: In this method, they handle every password that is possible through the dictionary<br \/>\nBrute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.<br \/>\nKeylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details<br \/>\nShoulder surfing: The attackers observe the user\u2019s keyboard by looking over the user\u2019s shoulder.<br \/>\nRainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user\u2019s password.<\/p>\n<p><strong>8. Social engineering:<\/strong><br \/>\nAttackers create social situations that encourage you to share your password. For example, let\u2019s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization&#8217;s data. The best way to avoid the effects of social engineering is to learn your organization\u2019s protocol regarding password sharing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion. 4. Phishing: The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this: If someone is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":59832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[43],"tags":[5476],"class_list":["post-59975","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-special-feature","tag-special-feature"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/radioislam.org.za\/a\/wp-content\/uploads\/2021\/11\/computer-security.jpg?fit=299%2C143&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"jetpack_shortlink":"https:\/\/wp.me\/pc0QIf-fBl","jetpack_likes_enabled":true,"publishpress_future_action":{"enabled":false,"date":"2026-04-24 10:08:59","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts\/59975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/comments?post=59975"}],"version-history":[{"count":0,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts\/59975\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/media\/59832"}],"wp:attachment":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/media?parent=59975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/categories?post=59975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/tags?post=59975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}