Skip to main content

MOST COMMON CYBER ATTACKS


1). PHISHING:

       • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers. 
       • Phishing implies   the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit.

2). Viruses and Malicious Codes:

       • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files. 
       • There is a huge variety of viruses, and each may impact the infected websites differently.

3). UI Redress:

      • This technique is similar to the phising; but in this case a hacker could create a fake hidden user interface.
        • once the user clicks that button with an intention of to proceed to certain page he will find himself on an unfamiliar website. Usually, with an inappropriate content.

4). Cookie Theft:

      • with the help of a malicious software hackers can steal your browser's cookies contains lot of useful information login information, Usernames, passwords, browsing history. As you can understand that data can contain logins and passwords to websites administration's panel.

5). Denial of Services (DOS/DDOS):

        • DDOS stands for Distributed Denial of service. DDOS attack is a way to make certain servers unavailable. Or in other words a way to crash the server.
        • To interrupt or to crash the server hackers use bots. Those bots soul purpose is to send requests to the website, a lot of requests. As, a result a server unable to process all of the recieved requests would simply crash the server. The most hazardous thing about this is that hackers could crash the server relatively in a small amount of time.

6). DNS Spoofing:

       • This malware is also known as DNS cache poisoning. It engages that old cache data you might have forgotten about. Vulnerabilities in the domain name system allow hackers to redirect users from user website to a malicious one. Moreover, hackers can program this attack to the infected DNS server will infect another DNS and so on.

7). SQL Injection:

      • If your website had vulnerabilities in its sql database or libraries, hackers can get access to your confidential information by deceiving the system. So there is no surprise that SQL injections can also be a simple tool. But this tool can allow a hacker to access vital information of your website.

8). Keylogger Injection:

      • The keylogger that very simple and dangerous malicious codes. The malware auto records keystrokes, captures all of the users actions on the keyboard, and send all that has been recorded to the hacker; it also installs a malicious scripts that produces an in-browser cryptocurrency miner.
        • If a hacker succeeds in obtaining data, then the result of the hacking will be stolen admin credentials that can allow hackers to easily log into your website.

9). Brute Force:

       • A Brute force attack is the simple method to gain access to a website. It tries various combinations of the passwords again and again until get's in. This repetitive action is like an army attacking a fort.

Comments

Post a Comment

Popular posts from this blog

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...

SAY NO TO SHYNESS !!!

13 Confident Ways to Overcome Your Shyness Those who have never suffered from shyness have no idea how debilitating it can be, especially for someone in a professional situation. If shyness is holding you back, learn how to get past it and become more confident. Shyness can truly hold people back --partly because those who are shy tend to avoid public situations and speaking up, and partly because they experience so much chronic anxiety. ⁣⁣ If that's you, take comfort in knowing you are far from alone--four out of 10 people consider themselves shy. But here's the good news: Shyness can be overcome. With time and effort and a desire to change, it's possible to break through. If your shyness is severe, you may need help from a therapist or counselor, but most people can overcome it on their own. Take your first steps in getting past shyness with these 13 techniques to help you become a more confident you. 1. Don't tell. There's no need to advertise your shyness. T...