Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Avast Blog_Tips & Advices: Common cyber attacks that compromise your online privacy
#1
Lightbulb 
Quote:
[Image: TVDumYE.png]

Learn about the most prevalent online attacks and how to take preemptive action to protect yourself and your data

As technology has evolved, so have cyber threats. Hackers can target individual devices and compromise the security of personal data and information such as passwords, account numbers, and even medical records. The destructive results could be identity theft, leaked company secrets, a destroyed credit score, or drained bank accounts. In the era where all information is stored and transmitted online, it can be easy for attackers to steal your personal data. 
 
Common types of cyber attacksHTTP injection

HTTP works as a request-response action between the browser and server. For example, a request is sent to a server when you click on a search engine result, and the response back to your browser directs you to the correct page. HTTP injection attacks occur when an attacker intercepts the response from a server and injects malicious code. This can result in data loss or corruption, downloaded malware, or even device takeover. HTTP injections can also be an easy “in” to a device or network, allowing a hacker access to perform more damaging tasks.

Man-in-the-Middle

A man-in-the-middle attack consists of a victim, an entity the victim would like contact with, and the attacker. The attacker inserts themselves between the victim and the entity with the intention to steal personal information such as login credentials, or bank account and credit card numbers. Typical methods of MITMs include phishing attacks, stealing browser cookies, and identifying saved login information.

SSL stripping

HTTPS functions the same as HTTP in its request-response protocol, but is more secure due to request encryption through SSL. SSL stripping entails removing the web page encryption offered by HTTPS. When a web browser first comes in contact with a server, there is a redirection to the secure HTTPS. During this brief gap before encryption, attackers can intervene to demote HTTPS to the more vulnerable HTTP. The attacker will then continue to establish an HTTPS connection between himself and the server, and an unsecured HTTP connection with the user, acting as the “man-in-the-middle” between them with access to your data. 

Packet sniffing

Entering a website using an unsecured network allows the attacker to use the weak network to latch onto the packets of information between you and the site you are trying to connect to in a process known as packet sniffing. Any stored cookies will be stored by the hacker as well, including passwords to important online accounts.

Fake Wi-Fi hotspots

It is easy for an attacker to set up a hotspot to look reputable, such as naming it ‘Starbucks’ inside of a coffee shop, or giving it an identical name to a network you frequently use. When users connect to this fake Wi-Fi hotspot and start transmitting data, all that information is immediately delivered to the hacker. 
Armed with the right tips and tricks, you can avoid each of these cyber attacks and ensure the safety of the websites that you visit.

How a VPN can help

A VPN can be your best friend in staying protected from cyber attacks. VPN stands for virtual private network, and connects remote sites or users through a public network, most commonly the internet. By routing the internet through your chosen private network server, the VPN hides your personal IP address, encrypts data, and protects your identity. With all information encrypted from Point A (you) to Point B (the intended location), any data intercepted by attackers is unreadable. This allows a secure connection over both public and private networks. 
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] EaseUS Data Recovery Wi...
Congratulations to a...jAcos — 12:53
GFYI [Official] Wise Video Converter Pr...
Congratulations to a...jAcos — 12:46
Mozilla Firefox 125 brings text highligh...
Mozilla is set to ...harlan4096 — 10:53
AV-Comparatives - Real-World Protection ...
Introduction Th...harlan4096 — 09:14
AV-Comparatives - Malware Protection Tes...
AV-Comparatives - M...harlan4096 — 09:10

[-]
Birthdays
Today's Birthdays
avatar (48)fuspeukChark
avatar (42)werriewWaiNg
avatar (36)Freemanleo
Upcoming Birthdays
avatar (43)wapedDow
avatar (47)oapedDow
avatar (40)Sanchowogy
avatar (42)techlignub
avatar (41)Stevenmam
avatar (48)onlinbah
avatar (49)steakelask
avatar (43)Termoplenka
avatar (41)bycoPaist
avatar (47)pieloKat
avatar (41)ilyagNeexy
avatar (49)donitascene
avatar (49)Toligo
avatar (36)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>