10 Ways Hackers Get Into Your Computer (Popular Types of Cyber Attacks)

preview_player
Показать описание

Here are 10 ways hackers could get into your computer and steal your information.

1: Wipers

Wipers are a malware that are used to erase information. In the last video we talked about ransomware, which holds files and information hostage for financial gain. This is different. Hackers using wipers don’t really expect a financial return. Granted, they may use wipers to cover the tracks of separate data thefts. But wiper attacks are disruptive, not financial. For example, in 2014, Sony Pictures was releasing a movie about Kim Jong Un. Apparently he didn’t like this because they were attacked with wipers. The hackers deleted the studio’s data and then released private emails and information.

2: Phishing

Phishing is not new, but it is consistently one of the most common and successful tactics used by hackers. They reach out, either over the phone or online, pretending they are a trusted source. They may claim to be a person you know or an organization you trust. Then they send you links with malware or redirect you to fake sites that steal your information. If an email or message seems fake to you, look for these signs: an irregular email address, a lot of typos, or weird subject lines. Requests for personal information are also a big warning sign.

3: Whale & Spear Phishing

Whaling is just like phishing, but it’s reserved for the “big fish”. Instead of finding people, say, on social media, these scams target big corporations and high level execs.

4: Pharming

Pharming uses a fake landing page disguised as a website you trust. Most commonly, pharming scams target banks and their patrons. People go to the webpage to log in, but they are rerouted by the link to a fake page. When they enter their information to log in, the hackers steal it.

5: SQL Injection Attacks

During an SQL Injection attack, hackers look for weak points in webpages, like contact forms, and insert malware. From there it’s easy to steal information.

6: Denial of Service (DoS)

A Denial of Service attack can be difficult to recognize because it uses web traffic to shut down a website. It’s true that sometimes a system or network can crash when there’s too much traffic, but DoS is not an accident. Hackers infect computers on the network with malware and turn them into bots. Then they can control them remotely and prompt a server overflow or network error.

7: Brute Force Attacks

During a brute force attack, hackers use software to guess your login credentials. This could seem nearly impossible to do, but with the right computing engine or botnet, it can be done. In fact, 1 in 5 networks have experienced a brute force attack. If you notice multiple attempts to login from the same IP address or, the opposite, many IP addresses trying to log in to the same account, this could be a sign that you’re facing a brute force attack.

8: Man In The Middle Attacks (MitM)

Hackers can use a shoulder-surfing type tactic to steal your information. They can eavesdrop on your connection. They can also insert themselves through an IoT device or through unsecured WiFi. Then they intercept data between a server and a client.

9: Insider Threats

Sometimes an insider threat is intentional - and sometimes it's just an accident. For example, an employee could accidentally download some type of malware. But also, an employee with access to private information could simply choose to misuse their access.

10: Zero Day Attacks

They are called Zero Day attacks because these kinds of attacks take advantage of newly-found bugs and weaknesses. There is a small window of time before developers can fix them, so hackers often try to capitalize on that time frame. To catch these, apps and sites should be monitored closely and frequently.

#cyberattack #cybersecurity
Рекомендации по теме