Home Top Ad

Responsive Ads Here

Common Hacking Techniques That Everyone Needs To Be Aware Of

Share:

 


Hacking is any unauthorized access to data in a system or computer. Lately, the incidence of hacking has been very common.

According to Security Magazine, there are over 2,200 attacks each day which breaks down to nearly 1 cyberattack every 39 seconds.

In this article, I am going to highlight some of the vicious techniques hackers use to access people’s information.  You have to be aware of some of these techniques and take possible steps to avoid being a victim.

1. Phishing

The most popular hacking approach is phishing. Phishing mails flood our inboxes and text messaging apps on a regular basis. These are messages disguised as an organization (Amazon, Netflix, etc.) or a person you trust, and they will, in most cases, give you  stories to deceive you into clicking on a link or opening an attachment. Sometimes they use popular freebies that may attract your attention to click the link. “MTN Free Internet data, Coca cola anniversary gift etc.” are some common phishing mails.

Typically they will:

  • Inform you that someone has been trying to log into your website and you should update your credentials
  • Claim that there’s a problem with your account or your payment information 
  • Ask you to confirm some personal information
  • Include a fake invoice
  • Inform you that you are eligible to register for a state refund
  • Offer you free stuff

2. Bait and Switch Attack

Attackers can fool you into visiting malicious websites by using trusted marketing strategies such as paid advertising on websites. Rogue attackers can purchase ad space on websites that sell it. The legitimate advertisement might be substituted with a ‘bad' link that downloads malware, locks your browser, or compromises your systems.

The advertisement could also connect to a legal website, but it will be coded to send you to a malicious website.

3. Key Logger

A key logger is a piece of software that, once installed on your computer, records every keystroke you make. Every keystroke on the keyboard, every login, password, and credit card number, for example, will be recorded by the key logger, revealing all of your data and personal information. This means whatever you type on your keyboard are automatically sent to the attacker. Normally, key logger apps are installed by attackers when they have physical access to your device (laptop or phone). Key logger apps are mostly disguised as another app after it has been installed by the attacker. For instance, a key logger app may appear on your phone as a calendar or clock app.

 4. Denial of Service (DoS\DDoS) Attacks

A Denial of Service attack is a hacking technique designed to flood your web server with a myriad of requests to the point that it overloads the web server resulting in a website crash. To do this, hackers will deploy botnets or zombie computers (programmes designed to undertake automatic task) that have a single task; flood your web site with data requests. This type of attack are usually meant to corrupt your data. Website owners such as bloggers, businesses, and celebrities are usually the targets.  

5. Cookie Theft

The cookies in your web browsers (Chrome, Safari, etc.) store personal data such as browsing history, username, and passwords for different sites we access. An attacker would send I.P. (data) packets that pass through your computer, and they can do that if the website you are browsing doesn’t have an SSL (Secure Socket Layer) certificate. Websites that begin with HTTPS:// are secure, whereas sites that start with HTTP:// (no ‘S’) do not have SSL and are NOT considered secure.

 

6. Fake WAP

A hacker can imitate a wireless access point (W.A.P.) using software, which can connect to the ‘official' public place W.A.P. that you are utilizing. A hacker can access your data after you connect to the false W.A.P.

To deceive you, the hacker will name the bogus W.A.P. something like 'Airport Free WiFi.' So you need to be careful of some public free wifi you connect your devices to.

 

7. Social engineering

Social engineering is a deception method that takes advantage of human error to acquire access to private information, goods, or both. These "human hacking" scams are commonly used in cybercrime to trick unsuspecting individuals into disclosing data, spreading malware infections, or granting access to restricted systems. Attacks might take place online, in person, or through other means.

Scams based on social engineering are designed to manipulate people's thoughts and actions. As a result, social engineering assaults are very effective in influencing a user's behavior. An attacker can easily deceive and influence a user once they grasp what inspires their actions. An attacker pretending to be a person from authority, usually call victims informing them that there is a problem or promotion going on, asking the victim to give him their password, code, credit card number or pin. Some fraudsters use this technique to take control of your social media account.

Lately, the common one is where fraudsters try to take control of a WhatsApp account. They try to log in with victims WhatsApp account, when that happens, the victim receives text message with a code from WhatsApp indicating that the victim is trying to log onto WhatsApp on another device. The fraudsters will then call the victim to mention that code to them, telling them false stories to convince them.      

So as internet user you need to:

  • Use comprehensive internet security software
  • Keep all your software updated as soon as available
  • Never click on links in any emails or messages (verify the authenticity before clicking)
  • Don’t ever leave your devices unsecured in public (lock your devices)
  • Use strong passwords (and a password manager)
  • Always confirm the validity of the email with the sender before you click on a link or download a file
  •  Do not give your password, code or credit card number to anyone under any circumstance.

Stay safe!!!

 

 

 


No comments