Common type of Attacks

Email Phishing

Fake emails, disguised to seem authentic, are used to obtain personal information such as; names, passwords, emails and more in order to create further damage.

Malware

Malware, short for malicious software, is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. A virus is a form of malware.

Man in the Middle

This involves a hacker intercepting data before it is sent to the access point. This allows the hacker to hide by appearing as a genuine connection point.

Fake Wap

While free public Wi-Fi is very convenient, it is also very unsafe. Crooks are able to connect to people’s devices. They do so by creating fake Wi-Fi hotspots and are able to do so imitating real network names.

Sections

Social Engineering

Not all attacks involve lines of coding and network penetrations. SE is an attack method which involves manipulating people to give up confidential information. Which hackers wil...

Evil files/Backdoors

These are programes which often negate authtication and gain access to systems. They often run in the background and include malware, worms, Trojans, rootkit, keylogger, spyware, and more

Website hacking

Particularly sites with confidential data (Banking, online payments and more) it is important that the site is on HTTPS. The ‘S’ stands for secure and means no one is able to tamper/adjust the website you are on.

Network Penetration

If a hacker gains access to your WI-FI, all devices connected can be compromised.There are different types of networks with different netwrok encryptions;

Ethical Hackers

Ethical hackers are employed by firms to discover vulnerabilities from an attackers POV. This can be through a number of methods including; penetration attacks, system hacking, social engineerin...

Cyber Security Profile

Overview of of each section exploring what: Social engineering is and how its implemented. Potential evil files and backdoors. Past website attacks with big companies. What ethical hackers are and more.