Friday, November 15, 2013

Be safe in Cyber space

The cyber space or the internet is a place where an uncountable number of data transfers happen. While you log in to an account your user name and password is passed through many network. But it’s safe. But even it’s safe there are many ways to hack the accounts.
What kind of accounts you have?
·        Email accounts
o   Gmail
o   Yahoo mail
o   Live mail
o   Hotmail
o   Outlook mail etc.
·        Social networking
o   Facebook
o   Tweeter
·        Online banks
o   Pay pal
·        E-commerce sites
o   Ebay
o   Amazon

Why to make it safe and why hackers hack accounts?
            All our accounts contain our personal details. On social networking sites we mentions most of our private details photos and more.
            In our emails we register for many site. For online bank accounts, e-commerce sites and more.
            A hacker look in to hack those accounts for criminal works or some bad unwonted work and to clean our bank accounts by transferring all the money to his account.

If the internet is safe how a hacker hack our accounts?
            There are many methods for hacker. In true only few hackers are there who can hack the brake the algorithm and decrypt the data transferred via the internet.
            Visit the below link for more information about encryption.

Methods of hacking.
·        Phishing attacks
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
While you browse a site and to prevent phishing attack follow the below steps.
o   Check the site URL before entering the user name and password
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvmQT91rwFWPYkoMMc-yN5zEvTySAWSZkTz1zITUwNcll2q69aLe9LhJsvg_1suGq7XlhaIaZLr4yHLZcuk70tNys3VmL0gPxFuKxmi6Wrw1s50PvpqZPxntEU03lF72ed2rw1sSSkI1-T/s1600/Untitled.jpg

o   Before you log in to a site with your user name and password check whether the site is going through a secure connection or not.
§  Unsecure – http://facebook.com
§  Secure – https://facebook.com
Always check for the https on log in.

·        session hijacking
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1fGU48e5MAAC0d9IOTvJyW94Z_e4hvIfUSFWB3gPDgBmauNHVzC5yYO64100h93vef43OH1tD7whR1gzPD5MkD4w_B-31Fy0V3ob4NWrL5WZ7niT9qaVUqPku-XGBqUN2Y_FnY1pkY3c/s640/Hijacking+HTTPS+Sessions.png
·        Trojan horse
A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These backdoors tend to be invisible to average users, but may cause the computer to run slowly. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
·        Key logger

Keystroke logging, often referred to as key logging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous key logging methods, ranging from hardware and software-based approaches to acoustic analysis.

No comments:

Post a Comment