2015年4月20日星期一

Hacking-Terms&Techniques

KEYLOGGERS

•What is it?

A Key logger is “a non-destructive surveillance program” that involves the hacker tracking and recording every key that is pressed on a technological device, as well as the exact touchscreen points made by the user of the device. It can also be considered either a “spyware or a software”. The recording that is “collected can then be saved as a file and/or sent to another device”, making it possible for another individual to see every keystroke and touchscreen point that was made by the user. This results in the possibility for a black hat hacker to recreate the user’s login IDs and passwords and put personal information at risk. However, can also be used as a surveillance tool by employers to ensure that their workers are on task.

•How do they do it?

The log file that is created by the Key logger hackers are most commonly buried onto a particular device, network or system using a “Trojan that is delivered by a phishing email” or a text message to a specific or random user. 

 

ADWARE

•What is it?

Adware is a software that is designed to constantly and “automatically generates advertisements” to display on your technological system. Adware is sometimes malicious and will involve frustrating and constant “pop up ads that will often slow down or sometimes even shut down your system and its resources.”” 

•How do they do it?

Adware can be “included within some purchases or downloads” of particular programs, as a genuine and legal method of creating advertising profits for a business or organisation. In addition, “going on an infected website” can led to gaining an illegal installation of Adware.  Your device can also be infected from a certain browser’s vulnerability and also Trojans that are designed for stealthy installation of adware.  

 

VIRUSES

•What is it?

Computer viruses are simple programs or codes that are design by malicious programmers in order to harm and cause problems for the device and the owner of the device. The damage that viruses cause can vary from being just a minor inconvenience and frustrating or being disastrous with erasing data, corrupting files, taking down your whole computer system.  

•How do they do it?

The infection of viruses are most commonly gained from opening  false email attachments. However they can also be gained from the download or purchase of illegal software and infected files. Viruses spread by multiplying itself repeatedly and attaching itself to other files within the device, therefore infect other devices.

 

WORMS

•What is it?

Worms are self replicating malware systems which are able to view files on the system and also cause lag. However, it does not report back to the hacker. A worm is quite similar to a virus as it's a destructive self-contained program that can replicate. However, a worm does not need to be a part of another program and it can copy and transfer itself to other systems. A worm can become dangerous if not isolated and removed. .But it usually doesn't do more than damage or ruin the computers. A worm can replicate out of control can consume system resources, until a system becomes unstable and unusable. 

•How do they do it?

The infection of worms are most commonly gained from opening  false email attachments or accepting internet ads. 

 

TROJANS

•What is it?

A Trojan, or Trojan Horse, is a malicious program disguised as a valid program. This makes it very difficult to distinguish it from real programs that are actually supposed to be there. A Trojan can destroy files, alter info, steal passwords or information etc. On the other hand it may stay dormant until a hacker accesses it and take control of the system. A Trojan is a lot like a virus, but without the ability to replicate.

•How do they do it?

Trojan is similar to adware and spyware, it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability.

 

SPYWARE

•What is it?

Spyware is a malware software designed to gather information about a user’s computer, without them knowing about it. It can just track a user’s Internet habits for advertising purposes or it can scan computer files, keystrokes, create pop-up ads, direct you to websites etc. Most commonly it is used to generate a pop-up ad informing you that your system is infected and force you to a page that has the solution. 

•How do they do it?

Spyware is similar to Trojan and adware where it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability and Trojans.

 

ROGUE SECURITY SOFTWARE

•What is it?

This comes under malware. It is a form of internet fraud that can be based on false positives. It is when a hacker deceives the computer user that there is something good happening, where it is actually the opposite of something harming your computer or doing nothing at all. A common example of this is when a software you are paying for to protect your computer but it just ends up doing nothing which is a scam. 

•How do they do it?

They mislead a computer user into paying money for false systems that are said to will remove a malware that your computer has. Therefore it is included in the purchase of false software. 

 





 



没有评论:

发表评论