Professional Documents
Culture Documents
Terminologies To Safeguard
Your Online Business from
HACKERS
Credits -: @Kingofowners
1. Malware
Phishing is one of the most common hacking terminology used by security
people. Phishing is a technique which tricks users into revealing sensitive
information (like usernames, passwords, or credit card details) to
seemingly benign sources.
A phisher disguises as a trustworthy entity and contacts potential
victims asking them to reveal information. This could be further used
for malicious intent. For example, a phisher may pose as a bank and
ask for a user’s bank account credentials via e-mail. Or he could trick
you to click on a fraudulent link. Phishing is a type of social
engineering.
2. Spoofing
E-mail and IP spoofing are few common hack techniques encountered by
users worldwide. E-mail spoofing involves altering the header of an e-mail
to make it look legit. For instance, a black hat hacker can make an e-mail
look as if it has appeared from your bank or any other source you may
trust. On the other hand, IP spoofing refers to an illegitimate packet sent
to a computer with an altered IP appearing to be a trusted host.
This is carried out with the hope that the packet would be accepted that
will allow the sender access to the target machine.
3. Encryption
Encryption is a process of encoding a message or information to make
it unreadable and secretive. This ensures that the concerned
information is concealed only to the authorized parties.
A bot is a software robot that runs automated tasks (scripts) over the
Internet. Many search engines like Google and Bing employ bots, also
called spiders, to scan websites and index them for purpose of
ranking them according to returns on search queries.
But when these bots are used by hackers, they can be programmed to
perform malicious tasks, as well as introduce malware into the
system. Learn more about bad bots.
9. Botnet
A swarm of botnets not only help cover the black hat’s tracks
but raise the intensity of the attack by attacking in a
coordinated effort.
10. Worms
T
Written By: Hackersplanet
E
Share And Support Us ❤