What is Hacking? || How does a hacking attack occur? - Jay Nayak

What is Hacking?



How does a hacking attack occur , malware attack , phishing attack , waterhole attack , mobile applications attack , hackers , hacking


Hacking means gaining access to someone's computer, mobile phone or any other electronic device without permission.

A person who hacks a mobile, computer or laptop etc. is called a hacker. Hackers are skilled computer programmers with knowledge on computer systems.

Hacking attacks happen in many ways and there are many types of hacking attacks such as phishing attacks, malware attacks, killocker attacks, waterhole attacks etc.



1.  What is Phishing and Phishing Attack? 



Phishing is a type of social attack used to steal login credentials, credit card numbers and debit card data.

Phishing attack is the practice of sending messages to deceive and fool people which appears from a reputable source.

Phishing is a fraud email that sends you unsolicited email that even sends you email incorrectly but that email looks like a real bank email.

The goal of hackers is to steal sensitive data, such as credit card and login information, or to install malware on the victim's machine.

The phishing email contains a link that takes you to a fake webpage and asks you to fill in your bank information, and if you fill in that information, it goes straight to the hackers' server then they send you an attachment and you have to download the attachment . 

Most people associate phishing with e-mail messages that spoof, banks , credit cards , companies or other business  like Amazon and ebay.

Hackers send messages to you in a way that makes you feel that the message is authentic and tries to disclose their personal information to victims.

If you fill in that information, those people will send you an attachment along with the message.

And if you download that connection, malware gets installed in your system. And those people access your account.

Here's how to save :

1. Check the domain name
2. Check the spelling



2.   What is Malware and Malware attack? :

                                      

Malware is software designed to steal statistics. 

Malware is often created by teams of hackers. They make money by spreading the malware virus themselves.

Types of malware can include Trojans, adware, worms, rootkits and spyware. 

Malware is a type of virus that can hack a file system without going to a hard disk.

Spyware is designed to spy on you which can read your activities, passwords, login information etc.

Malware is a virus that collects all the information about an infected computer and passes it back to the attacker.

Malware users use various physical and virtual media to spread malware that infects devices and networks.

  How to save:
  Install a good antivirus on your phone, computer, laptop.
  Never click on antivirus pop-up.


3.  Mobile Applications :





There are many types of phone hacking methods, ranging from hacking into someone's live conversation or voicemail and hacking into data stored on someone's smartphone.

The only person who is likely to hack your live conversation or voicemail is someone you already know or have an eye on.

Currently all phones have password and fingerprint sensors. all phones have password protection but not all use it.

Some people use a password to protect their phone but some people don't. Change your password regularly to keep your phone secure.

Computer operating systems (Windows for PCs, macOS for Apple), are updated often, between new versions.  


Do not give more permission to any apps you download in the Playstore. 

You should always download and install mobile apps from trusted sources.  

  You should never allow the microphone to record your conversation.




How to Secure Your Phone From Hackers? : 



  •     Change your phone’s default passcode.
  •      Don't download apps with less than 50,000 downloads.
  •      Don't download third-party apps.
  •        Protect your PIN and Credit Card data.
  •     Keep your Operating system up to date.



4.  Keep the password or lock of the working folder in the computer and do not keep the password notepad or anywhere in the computer.



5.  Do not use Public wifi network : 



Network security is security designed to protect the usability and integrity of your network and data.

The purpose of hackers is to connect to a network where many users are already connected.

A lot of people are already connected to public wifi and hackers target public wifi only.

  Once they gain access to such a network, they can configure their strategy to gain control over all data and communications on this network.

Hackers can easily access information from customers using public WiFi.

WiFi networks are an easy target because they are often insecure, or not as secure.

Whenever you get any device connecting to the internet, the first thing to do is change its default password. If you do not do this, anyone can log in to your router and change its settings.

All WiFi routers support certain types of encryption, which scrubs the information you send over the Internet.

There are many types of encryption, so be sure to choose the strongest form available. WPA (WiFi Protected Access) or WPA2 is currently the strongest in use.

Public Wi-Fi does not provide encryption for individuals using the same password and hotspot. Also, your signals are transmitted to the immediate area.

     Do not make Internet transactions over free WiFi.




Is Public wifi safe ? || Is 3rd party application safe? 


Comment me.....



Post a Comment

0 Comments