Tech Security Facts

Below are some fun facts on technology security facts that I have compiled from various resources.

1. How is websites made secure from hackers?

Website developers use a technology called cryptography to protect information from unintended audiences and encrypt it. Cryptanalysis, in turn, is the art and science of breaking encoded data. Modern cryptography uses advanced math (algorithms) equations and secret keys for encrypting and decrypting data.

2. The difference between hacking and cracking

The difference is that a hacker is someone that uses their extensive knowledge of computer logic and code for malicious purposes, while a cracker – looks for back doors in programs, and exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually involved with web related hacking, like MySQL interception, or phishing, other forms of hacking would include things like brute force, or password lifting.

3. Phishing attack

Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has.

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

4. Cyber Terrorism

Cyber terrorism is the use of Internet based terror attacks, done deliberately in order to create disturbances or havoc in usual working of the internet.  Since, many computers are connected through internet, the chances of high disruption in computer related services in personal as well commercial devices. Attacks through cyber terrorism can be in form of various illegal activities whose number is on a constant increase, a few are most lethal and common. These include attacks from viruses, attacks from Trojans, attacks from BOTS, attacks on databases, black hat hacking etc.

5. E-mail Spoofing

E-mail spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source. The goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation.

6. WannaCry Ransomware

A global cyber-attack has been underway, affecting more than 200,000 organisations in 150 countries. In the UK, the major assault hit 47 NHS trusts, leading to operations being cancelled and patients turned away from A&E.

The “WannaCry” ransomware appears to have used a flaw in Microsoft’s software, discovered by the National Security Agency and leaked by hackers, to spread rapidly across networks locking away files. 

A security expert managed to stop the attack by triggering a “kill switch” but it has continued to wreak havoc. 

Ransomware, which demands payment after launching a cyber-attack, has become a rising trend among hackers looking for a quick payout. 

7. What is Jammer?

In mobile computing, a jammer is a mobile communications device that transmits on the same frequency range as a cellphone to create strong cell tower interference and block cellphone signals and call transmission. Jammers are usually undetectable, and users may experience minimal effects such as poor signal reception.

8. What is Dark Web?

The “dark web” is a subset of the “deep web”. The deep web is just the part of the web that isn’t accessible by search engines. You won’t find these websites when you use a search engine like Google or Bing, but they’re otherwise normal websites. The “dark web” is a smaller part of the deep web that can’t be accessed without special software.

9. What is Darknet?

Contrary to the deep web, Darknet is better known to the people. It is an encrypted network built on top of the existing internet, and specific software or tools are required to access the darknet. It is possible, conventional protocols used on the internet might not work on the darknet.

Darknet provides anonymity to the users. One such darknet is Tor or The Onion Router. You require the Tor browser to enter into the Tor’s network.

10. Bluejacking

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.

Leave a Reply

Your email address will not be published. Required fields are marked *