The
cyber space or the internet is a place where an uncountable number of data
transfers happen. While you log in to an account your user name and password is
passed through many network. But it’s safe. But even it’s safe
there are many ways to hack the accounts.
What
kind of accounts you have?
·
Email accounts
o Gmail
o Yahoo mail
o Live mail
o Hotmail
o Outlook mail etc.
·
Social networking
o Facebook
o Tweeter
·
Online banks
o Pay pal
·
E-commerce sites
o Ebay
o Amazon
Why
to make it safe and why hackers hack accounts?
All our accounts contain our
personal details. On social networking sites we mentions most of our private
details photos and more.
In our emails we register for many
site. For online bank accounts, e-commerce sites and more.
A hacker look in to hack those
accounts for criminal works or some bad unwonted work and to clean our bank
accounts by transferring all the money to his account.
If
the internet is safe how a hacker hack our accounts?
There are many methods for hacker. In
true only few hackers are there who can hack the brake the algorithm and decrypt
the data transferred via the internet.
Visit the below link for more information
about encryption.
Methods
of hacking.
·
Phishing attacks
Phishing
is the act of attempting to acquire information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication. Communications purporting to
be from popular social web sites, auction sites, banks, online payment
processors or IT administrators are commonly used to lure unsuspecting public.
Phishing emails may contain links to websites that are infected with malware. Phishing
is typically carried out by email spoofing or instant messaging, and it often
directs users to enter details at a fake website whose look and feel are almost
identical to the legitimate one. Phishing is an example of social engineering
techniques used to deceive users, and exploits the poor usability of current
web security technologies. Attempts to deal with the growing number of reported
phishing incidents include legislation, user training, public awareness, and
technical security measures.
While
you browse a site and to prevent phishing attack follow the below steps.
o Check the site URL before
entering the user name and password
o Before you log in to a
site with your user name and password check whether the site is going through a
secure connection or not.
§ Unsecure – http://facebook.com
§ Secure – https://facebook.com
Always check
for the https on log in.
·
session hijacking
·
Trojan horse
A Trojan horse, or Trojan, is a hacking program
that is a non-self-replicating type of malware which gains privileged access to
the operating system while appearing to perform a desirable function but
instead drops a malicious payload, often including a backdoor allowing
unauthorized access to the target's computer. These backdoors tend to be
invisible to average users, but may cause the computer to run slowly. Trojans
do not attempt to inject themselves into other files like a computer virus.
Trojan horses may steal information, or harm their host computer systems. Trojans
may use drive-by downloads or install via online games or internet-driven
applications in order to reach target computers. The term is derived from the
Trojan Horse story in Greek mythology because Trojan horses employ a form of
“social engineering,” presenting themselves as harmless, useful gifts, in order
to persuade victims to install them on their computers.
·
Key logger
Keystroke logging, often referred to as key
logging or Keyboard Capturing, is the action of recording (or logging) the keys
struck on a keyboard, typically in a covert manner so that the person using the
keyboard is unaware that their actions are being monitored. It also has very
legitimate uses in studies of human-computer interaction. There are numerous key
logging methods, ranging from hardware and software-based approaches to
acoustic analysis.
No comments:
Post a Comment