Email Phishing
Fake emails, disguised to seem authentic, are used to obtain personal information such as; names, passwords, emails and more in order to create further damage.
Fake emails, disguised to seem authentic, are used to obtain personal information such as; names, passwords, emails and more in order to create further damage.
Malware, short for malicious software, is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. A virus is a form of malware.
This involves a hacker intercepting data before it is sent to the access point. This allows the hacker to hide by appearing as a genuine connection point.
While free public Wi-Fi is very convenient, it is also very unsafe. Crooks are able to connect to people’s devices. They do so by creating fake Wi-Fi hotspots and are able to do so imitating real network names.
Not all attacks involve lines of coding and network penetrations. SE is an attack method which involves manipulating people to give up confidential information. Which hackers wil...
These are programes which often negate authtication and gain access to systems. They often run in the background and include malware, worms, Trojans, rootkit, keylogger, spyware, and more
Particularly sites with confidential data (Banking, online payments and more) it is important that the site is on HTTPS. The ‘S’ stands for secure and means no one is able to tamper/adjust the website you are on.
If a hacker gains access to your WI-FI, all devices connected can be compromised.There are different types of networks with different netwrok encryptions;
Ethical hackers are employed by firms to discover vulnerabilities from an attackers POV. This can be through a number of methods including; penetration attacks, system hacking, social engineerin...
Overview of of each section exploring what: Social engineering is and how its implemented. Potential evil files and backdoors. Past website attacks with big companies. What ethical hackers are and more.