Posts

Showing posts with the label Different Types of hacking attacks.

Top 10 most notorious cyber attacks in history

Top 10 most notorious cyber attacks in history Robert Tappan Morris and the Morris Worm (1988): Creator of the first computer worm transmitted through the Internet, Morris, a student at Cornell Univeristy in the USA, claimed it his progeny was not aimed to harm but was made for the innocuous intent to determine the vastness of the cyberspace. Things went pear-shaped when a the worm encountered a critical error and morphed into a virus which replicated rapidly and began infecting other computers resulting in denial of service. The damage? 6000 computers were reportedly affected causing an estimated $10-$100 million dollars in repair bills. While this event could be pinned as being an unfortunate accident, it no doubt played a part in inspiring the calamitous distributed denial-of-service (DdoS) type of attacks we see today. MafiaBoy causes $1 billion dollars in damages (2000): Another 15 year old that caused mischief in cyber space was Michael Calce a.k.a. MafiaBoy. In 2000, C

Different Types of hacking attacks.

Zero Day and DNS chache poisoning? What is zero-day attack? There are a few common, but slightly different definitions of zero-day attacks. Some define zero-day attacks as attacks on vulnerabilities that have not been patched or made public, while others define them as attacks that take advantage of a security vulnerability on the same day that the vulnerability becomes publicly known (zero-day). Software vulnerabilities may be discovered by hackers, by security companies or researchers, by the software vendors themselves, or by users. If discovered by hackers, an exploit will be kept secret for as long as possible and will circulate only through the ranks of hackers, until software or security companies become aware of it or of the attacks targeting it. These types of attacks are defined by some as 'less than zero-day' attacks. What is DNS hijacking? DNS hijacking is a type of malicious attack in which an individual redirects queries to a dom

Different types of hacking attack ?

Different types of hacking attack ? What is Dictionary attack? A dictionary attack is a technique or method used to breach the computer security of a password-protected machine or server. A dictionary attack attempts to defeat an authentication mechanism by systematically entering each word in a dictionary as a password or trying to determine the decryption key of an encrypted message or document. Dictionary attacks are often successful because many users and businesses use ordinary words as passwords. These ordinary words are easily found in a dictionary, such as an English dictionary. What is Back door? A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. The backdoor access method is sometimes written by the programmer who develops a program. A backdoor is also known as a trapdoor. What is Man in the middle attack? A man-in-the-middle attack is a type of cyberattack where a malicious actor i