8 COMMON HACKING TECHNIQUES THAT EVERY Tech And Business Persons KNOW ABOUT SEC ARTIC .V2

 


  • Phishing. Phishing is the most common hacking technique.

  • Attackers can trick you into visiting malicious sites using trusted marketing methods such as paid-for advertising on websites. When websites sell advertising space, it can be purchased by rogue attackers. The bona fide advertisement can be replaced with a ‘bad’ link that can be used to download malware, lock up your browser, or compromise your systems.

    Alternatively, the advertisement may link to a legitimate website, but it will be programmed to redirect you to a harmful site.

  • Key Logger. 

Key logger or Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. Sign of a keylogger attack is Signs a keylogger is monitoring your device including slow Internet performance, interrupted keystrokes, a disappearing mouse cursor and browsing errors.

  • Bait and Switch Attack.

  • Denial of Service (DoS\DDoS) Attacks.
  • ClickJacking Attacks. 
  • Fake W.A.P. 
  • Cookie Theft. 
  • Viruses and Trojans.

Comments

Popular posts from this blog

Google Hacking Guide

Sanitizing application text fields