A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Hacking Attacks

Botnets
Botnets

The word Botnet is formed from the words ‘robot’ and ‘network’. Cybercriminals use special Trojan viruses to breach the security of several users’ computers, take control of each computer and organise all of the infected machines into a network of ‘bots’ that the criminal can remotely manage.

ClickJacking Attacks
ClickJacking Attacks

A security header like X-Frame-Options will not protect users against clickjacking attacks that are not using a frame. Content Security Policy. The frame-ancestors directive of Content Security Policy (introduced in version 1.1) can allow or disallow embedding of content by potentially hostile pages using iframe, object, etc.

Common Types of Cybersecurity Attacks
Common Types of Cybersecurity Attacks

Similarly, when a criminal is trying to hack an organization, they won't re-invent the wheel unless they absolutely have to: They'll draw upon a common arsenal of attacks that are known to be highly effective, such as malware, phishing, or cross-site scripting (XSS).

source: rapid7.com
image: gov.uk
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)

Some examples of Cross-site Scripting attack vectors The following is a non-exhaustive list of XSS attack vectors that an attacker could use to compromise the security of a website or web application through an XSS attack.

source: acunetix.com
image: itilam.com
Denial of Service (DoS\DDoS)
Denial of Service (DoS\DDoS)

A distributed denial-of-service attack may involve sending forged requests of some type to a very large number of computers that will reply to the requests. Using Internet Protocol address spoofing, the source address is set to that of the targeted victim, which means all the replies will go to (and flood) the target.

Eavesdropping (Passive Attacks)
Eavesdropping (Passive Attacks)

Passive attacks basically mean that the attacker is eavesdropping. This is in comparison to an active attack, where the intruder attempts to break into the system to access or change data. Even though a passive attack sounds less harmful, the damage in the end can be just as severe if the right type of information is obtained.

Fake WAP
Fake WAP

Fake WAP Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

source: fossbytes.com
Hacking
Hacking

A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet.

source: lifewire.com
Keylogger
Keylogger

Keyloggers are applications or devices that monitor the physical keystrokes of a computer user. Learn the dangers posed by keyloggers and how to detect and prevent keylogger attacks on your system.

image: youtube.com
Malware
Malware

While everyone is vulnerable to phishing, malware or hacking attacks, there are a few key practices that can greatly increase your protection from the majority of instances. Make sure to invest in security solutions to keep your data safe. This even includes choosing strong passwords that can’t be easily guess by computer programs.

source: liquidweb.com
Malware Attacks
Malware Attacks

The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These types of attacks don't install new software on a user's computer, so antivirus tools are more likely to miss them.

source: csoonline.com
Man-in-the-Middle (MITM) Attacks
Man-in-the-Middle (MITM) Attacks

MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker.

Pharming
Pharming

The pharming attack definition, according to Wikipedia: “Pharming is an attacker’s attack intended to redirect a website’s traffic to another, bogus site. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software.

Phishing Attacks
Phishing Attacks

Hacking and phishing are related in that they are both ways of obtaining information, but they differ in their choice of methods. A phish, which is ultimately a hack, occurs when a user is baited with an email, phone call, or, perhaps, a text message and tricked into “voluntarily” responding with information.

image: astraid.com
Ransomware
Ransomware

What is WannaCry ransomware, how does it infect, and who was responsible? Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

source: csoonline.com
Spam
Spam

Anonymous: real spam is sent with spoofed or harvested sender addresses to conceal the actual sender. Mass mailing: real spam is sent in enormous quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective, the initial mails have to be high-volume.

Spear Phishing Attacks
Spear Phishing Attacks

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Spear-phishing attempts are not typically initiated by random hackers, but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

SQL Injection Attacks (SQLi)
SQL Injection Attacks (SQLi)

SQL Injection (SQLi) is one of the many web attack mechanisms used by hackers to steal data. It is perhaps one of the most common application layer attacks. SQL Injection (SQLi) is one of the many web attack mechanisms used by hackers to steal data.

source: acunetix.com
image: sunnyhoi.com
Virus, Trojan etc
Virus, Trojan etc

Now, virus generally refers to a malicious program that self-replicates but requires some user interaction to be initiated. Spyware. The term 'spyware' is a sub-division of viruses and refers to those programs dedicated to stealing your personal details (logins, passwords, personal info, etc) once they've found a way onto your computer or phone.

source: wired.co.uk
image: guru99.com
Waterhole Attacks
Waterhole Attacks

A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.

image: wired.com