Friday, 28 March 2014
0 HACKING IN SHEEP’S C LOATHING: • One method info is attained to hack into computers and email accounts is social engineering. This is considered a revolutionary art among computer hackers. • Social engineering tricks someone into believing that he is giving information to someone who has the authority to ask for it. • People can also fall prey to social engineering through online or real-life interaction. Online, the hackercan obtain information through chatting, email exchanges, message boards and so on. In real life, a conversation can be struck up with a potential victim. • An ingenious method involves creation a web page where users are required to enter their email address and password to supposedly find out if someone has deleted or blocked them from accessing messenger services. • Another common way is through the telephone. A user may receive a call from someone identifying himself as a system administrator of his company. TROJAN ATTACK: THE TRADITIONAL HACK • Specially devised programs, called windows keyloggers, are surreptitiously installed in the victim’s computer. • These programs can come through backdoor Trojans and viruses. A downloaded video clip, an innocuous b’day greeting or an email could carry them. • Once inside, the Keylogger will auto execute and recorded keystrokes made by the user and transfer email addresses and passwords to the hacker
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment