20 February 2018

Photo Credit: View Link

A Firstline Securities Limited Blog by: Ahamad Hosein

  • Temptations or “Trick and Treat”: Hackers trick users by attracting them to an Ad which, when clicked on, installs malware or adware onto these hackers’ computers which allow them access to almost anything they want from the user’s device.


  • Phishing: similar to the above is phishing – a method used by hackers to trap employees via sending them emails which appear innocent or familiar, but contain links which are spoofed.


  • SideJacking or Session Hijacking: this is a process of stealing browser history, usernames, and passwords from your system.  Hackers use the stolen cookies, or even assume the user’s identity on their browser, thus taking advantage of unencrypted communication channels.


  • ClickJacking Attacks: this is a ‘devilish’ technique by which users are tricked when they click on an “earn advertising dollars” link.  From there, hackers can steal your personal information.


  • Malicious software programmes such as the Virus, Trojan: once installed such programmes can steal, redirect, copy or even piggy-back themselves to files and dates. They can also create backdoors and override access!


  • Cyberstalkers, or in T&T dialect, CyberMacomen: unfortunately most, if not all users of the internet, are subject to some form or degree of this this type of stalking. This method of hacking is usually not done with the intent of harming the victims, but nevertheless hackers invade your privacy by accessing emails, pictures, telephone conversations and contacts etc.  Such activities are generally carried out by black hat hackers and government agencies.


  • Waterhole attacks – these can take the form of malware, espionage or strategic attacks on an organisational point, for example spear phishing instead of net fishing.  The hacker obtains a great deal of information through this method, such as traffic details, access locations etc.   Security systems would be exploited by attackers seeking to compromise a specific user, or group of users, by infecting websites that members of the group are known to visit.


  • Cyber Mimicker: these hackers set up fake public Wi-Fi hotspots which victims access freely to obtain internet access, however they unknowingly allow hackers access to their systems (be it their laptops, tablets, mobile phones, and any other wireless device).


  • A Denial of Service Attack: this is a hacking technique used to take down a website or server by overloading said site or server with traffic so that the site/server is unable to process all the requests in real time…and eventually crashes.


  • Denial of Service (DoS\DDoS): this is an attack meant to shut down a machine or network and disrupt the normal traffic to a website/ server.  In other words, servers or sites are overwhelmed with the increased traffic that they shut down due to overload.


Comments are closed.