Skip to main content

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it.


Social engineering is a term we are hearing now a days a  lot. But  what is it? 


Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions.


Lets see few techniques with examples below


Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person.


Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number.


Vishing also known as "voice phishing", is again the same practice of revealing the information over a telephone system to gain access to the private personal information especially credit card pin and One Time Password(OTP)s.


Example : The Fraud person calls you as the bank representative and may ask you to share the information about the bank credit card and OTPs. After sharing such information the personal data might get vanished in few minutes.


Smishing refers to the technique where the fraudster send an Short Message Service (SMS) to the victim containing malicious link. To get personal information about someone using text messaging.


Example : The fraud person approaches you through message about any lottery won or he might say an authorized person from the reputed bank or company and gives you a link to click and you would  get registered to it. But its a fraud its a malicious link which reveals your personal information.


Baiting is kind of attack, attackers leave malware-infected USB flash drives, pendrive, mobile charging  in locations people will find them metro stations, parking lots, railway stations, give them legitimate and curiosity-piquing labels, and wait for victims.


Juice jacking aim is to compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. It is similar to baiting where victim plugs on the device in the public or untrusted area.


The honey pot or honey trap involves making contact with an individual who has information or resources required by a group or individual, the trapper will then seek to entice the target into a false relationship in which they can glean information or influence over the target. The term "honey trap" is also used when social media sites, dating sites are used to gain access to a victim. These kind of people either need money or personal may have psychic behavior. 


Examples : Now a days a lot of people affected with this kind of people irrespective of the age and gender. Most of them just need money, few for personal benefit.


Catfishing is a deceptive activity in which a person creates a fictional persona or fake identity on a social networking service, usually targeting a specific victim. The practice may be used for financial gain, to compromise a victim in some way, as a way to intentionally upset a victim, or for wish fulfillment.


Examples :  The person catfishing uses another person's photos and life facts to make them appear as a real person. Their primary reason to appear as a fake person is to befriend the other person for a relationship or financial gain.


Spoofing is the act of disguising a communication or identity to gain an illegitimate advantage.  Spoofing can apply to emails, phone calls, and websites, IP address, or Domain Name System (DNS) server.


Example : Email Spoofing when an email is sent from a fake sender address, asking the recipient to provide sensitive data. The victim finds it legitimate and enter the sensitive data. Call spoofing is where a phone scammer will falsify the calling number to trick a user into picking up or making a call look more legitimate.


Piracy or online piracy or digital piracy is the practice of distribution of copyrighted content without the permission of the authorized person/organization. Intellectual property comes under this theft.


Example : movies, music, software, books downloading from unauthorized website. 

Comments

Popular posts from this blog

What is Malware?

What is Malware? Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Few are listed Below A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. It infect other computer without the permission or knowledge of the user. Virus may corrupt the system or can steal any data. A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.  A backdoor is a computer program that allows an attacker to gain unauthorized remote access to a victim's machine often without their knowledge. A Trojan horse is any malware that misleads ...

What are SSL and TLS?? What is the difference between SSL and TLS??

What are SSL and TLS?? What is the difference between SSL and TLS?? What is SSL? SSL (Secure Sockets Layer) is networking protocols which helps in securing the network. Transport Layer Security (TLS)  is the upgrade version of SSL. SSL is a digital document that secure the identity of any website. Basically it encrypts the data by using cryptographic key pairs which consists of public and private key. The public key is present in the certificate and allows the web browser to start off the communication given to the server. The private key is on the server and is used to digitally retrieve or sign the web pages and other files such as images, videos, scripting files. In SSL certificate we can see much information also which includes identifying information about the website, its domain name and identifying information about the site's owner. We could also see expiry information, serial number, company issued also about the certificates. To keep the website secure one should buy the...