Friday, 18 November 2016

Techniques used by the hacking community to steal information....

This next is a sub-category of the one above and in it is an enumeration of the some of the popular methods used by hackers gain unauthorized access to information and also carry out unscrupulous activities on the internet.


  1. Phishing also known as spoofing.
  2. Identity theft.
  3. Pharming.
  4. Using key logger applications.
Spam also known as unsolicited e-mails.

So i will discuss the first one and hopefully in the subsequent posts i might discuss the rest.

Phishing as the name implies is basically fishing but in this case on the Internet which is definitely a prodigious ocean for fishes. So phishing simply entails the use of a bait to source for confidential information, which i must say quite a number of unsuspecting people still fall victim to.

Here is one exemplary  instance for a clearer picture of what it is, so you receive an email probably with an attachment stating that there had been an error somewhere along the line with a transaction involving your bank account, now believe me this  email  most cases will look very convincing and credible and it is most likely that you might be contacted beforehand(as in by telephone), in the email attachment is contained a link link to a website, if this link is clicked you are directed to a website that looks very much like that of the banking service which you are subscribed to, it's even more convincing especially if you have never visited your banks website, on the website might be contained form boxes which would request that you enter information that might be related to your credit card or otherwise on the pretext that it will be used for your identification. As soon you have done that and submit the form, well you have supplied the managers of the website information which they could sell or even utilize to shop on the net, or worse the attachment on the email might contain any kind of file which when opened automatically infects the the device with a spyware which would steal sensitive information thereafter, well either way your computer becomes a tool for manipulation, so beware of the kind of mails  you would open and the kind of info you are sharing. Stay Safe.

No comments:

Post a Comment