It is therefore important to know how to guard against the techniques used to hack or harm us. Especially since hackers, these web pirates, are developing more and more and employing ever more formidable techniques. SooCurious introduces you to the techniques developed by these malicious computer geniuses.
As you certainly know, the internet world is dangerous and a playground for bad guys. These people are called hackers: they are hackers who use their computers to retrieve private information or to infiltrate the servers of large companies. Hence the importance of choosing the right passwords. Before hacking, the hacker will investigate his target. It will look for everything it can know about the person, namely the IP address, the type of software installed on the computer of the "victim". The easy search for this information through social networks, online forums. Once they have recovered this data, the hacking job can begin
Hacking is not for everyone: it takes a total mastery of computers to achieve it. These 2.0 hackers have several techniques to achieve their ends. The first of these is clickjacking. The idea is to push the Internet user to provide confidential information or to take control of the computer by pushing the Internet user to click on pages. Underneath the web page is an invisible frame, like a layer, that causes the person to click on hidden links. For example, there are flash games where the user has to click on buttons to score points. Some clicks allow the hacker to activate the webcam.
Another technique, perhaps more common, that of phishing. Also called phishing, this action carried out by the hacker aims to extract confidential information such as bank codes, passwords or more private data. To recover a password, a hacker can also launch what is called "a brute force attack". It will test all the possible combinations one by one (see doing a test with Fireforce ) with cracking software. If the password is too simple, the hacker will quickly enter your computer. On the other hand, hackers sometimes try to crack WEP keys, in order to access a wi-fi network. Again, if the key is too short cracking is easy. As hacking develops, more and more specialized techniques are developing.
There are now armies of hackers or groups working together to bring down big companies or banks. In early 2016, the international bank HSBC was hacked. Because of this, their site was completely inaccessible, which created panic among the customers of this bank. This episode is not isolated. It is even the last of a long series. To achieve panic in large firms, they use techniques more or less similar to those presented above, but on a larger scale.
The technique of social engineering is not a direct attack. Rather, it is a method of persuasion to obtain information from people in key positions. Hackers will target human vulnerabilities, rather than technical ones. An example of social engineering would be calling on a network administrator posing as a security company in order to gain valuable information.
Another method, that of stripping. The latter aims to modify a website by inserting content unwanted by the owner. This method is used by militant hackers who want to denounce the practices of certain governments or companies. To do this, the hacker exploits a security flaw in the web server hosting the site. Then, it suffices to give a maximum audience to the hijacking to discredit the target. In April 2015, the Marine Le Pen site was the victim of defacing: activists published a photo of a veiled woman with a message denouncing the stigmatization of Muslim women by the FN.
Finally, hackers also use DDOS (Distributed Denial of Service), which saturates a service to make it inaccessible, and Buffer Overflow, which causes a failure in the system to make it vulnerable.
Sometimes seen as criminals or as modern "Robin Hood" heroes, hackers are nonetheless dangerous people, who use their talents to break into computer systems or to obtain confidential information. You can also find in one of our articles, a list of brilliant hackers who have damaged banks and governments. Do you think hackers are vigilantes or criminals?
How to Protect your Computer Data Hacking.
The next important step in protecting your computer and your family is to install reliable antivirus software on your computer that can actively scan your system and fight viruses. However, you should be aware that not all Antivirus Software is created equal.
Free antivirus software is offered on the Internet, but most of it is not reliable enough to provide comprehensive protection or is not updated regularly to ensure security.
Comments
Post a Comment