You are on page 1of 2

Hacking definition

Hacking is the act of identifying and then exploiting weaknesses in a computer system or network,
usually to gain unauthorized access to personal or organizational data.

How do hackers hack


Hackers usually use a combination of psychological tricks and algorithms, programs developed
by themselves to attack your computer system and network. There are multiple types of hacks
that hackers use to gain access to your devices:

 Key logger
A small piece of software that, when downloaded into your computer, will record every
keystroke. The key logger will capture every keystroke on the keyboard, every username,
password and credit card number, etc., exposing all of your data and personal information.

 Bait and switch attack


Using trusted marketing methods such as paid-for advertising on websites, attackers can
trick you into visiting malicious sites. When websites sell advertising space, it can be
purchased by rogue attackers. The good advertisement can be replaced with a ‘bad’ link
that can be used to download malware, lock up your browser, or compromise your systems.
Alternatively, the advertisement may link to a legitimate website, but it will be programmed
to redirect you to a harmful site.

 Denial of Service (DoS\DDoS) attack


A Denial of Service attack is a hacking technique designed to flood your web server with a
myriad of requests to the point that it overloads the web server resulting in a website crash.
To do this, hackers will deploy botnets or zombie computers that have a single task, flood
your web site with data requests.

 ClickJacking attack
This method tricks you into clicking on something different from what you thought you
were clicking. The clickjacking element could be a button on a web page that, when clicked,
performs another function, allowing others to take control of the computer

 Fake Wireless Access Point


A hacker can use software to impersonate a wireless access point (W.A.P.), which can
connect to the ‘official’ public place W.A.P. that you are using. Once you get connected to
the fake W.A.P., a hacker can access your data.

 Cookie theft
The cookies in your web browsers (Chrome, Safari, etc.) store personal data such as
browsing history, username, and passwords for different sites we access. Hackers will send
I.P. (data) packets that pass through your computer, and they can do that if the website you
are browsing doesn’t have an SSL (Secure Socket Layer) certificate.Websites that begin with
HTTPS:// are secure, whereas sites that start

 Viruses/Malwares/Trojan horse
Hackers will target potential victims via email, messages and websites with downloadable
content or peer-to-peer networks. When the victim download the content, the
malwares/viruses will spread through their computer, locking their files, …

You might also like