Many users also make it very easy for hackers to set up very simple passwords, or to change the passwords they receive and need to change. According to a survey conducted in 2014, the code of the vast majority of people is un 123456 ’.
How to Cyber Attack?
If you clicked a warning button, such as a virus detected, or downloaded something that might contain such software, this malware will spread to your computer. Spreading this software on your computer requires that the installer be started first. This can be simple looking activities such as opening a pdf document in a file that seems to be very harmless, opening a document in a spam e-mail.
Malware allows you to take control of the computer, to access data, and to monitor network navigation.
Keylogger is a spy software for tracking and recording a person’s keyboard movements. It can also access the micron of your computer. It may result in theft of people’s bank accounts or theft of passwords in different accounts. This software can be downloaded and installed on the computer without noticing some anti-virus programs or firewall can block them, but it can not be blocked.
Viruses and Worms
Viruses and worms are malicious software that is often transmitted by downloading files without the user’s consent or without realizing it. In order for viruses to work, the operating system connected to the main program must be infected with the virus. Worms, on the other hand, are capable of copying themselves, so they can spread quickly on computers connected to the same server.
SQL ie the database stores a person’s personal information. Any data up to the card number, ID number, user credentials and passwords can be stored here. An attack software that has leaked through SQL vulnerabilities can take all the data and steal.
If you force a website’s server and overload it, the site cannot serve those who really want to access it. Indeed, as many people enter the site at the same time as a site collapse may occur as a very large proportion of the site’s capacity to attract more traffic is caused by damage to the site.
DDoS attack is to prevent people from serving by uploading to a site with people from different IP addresses all over the world.
A Warehouse of 80 Million Households Discovered in the US
A researcher was found to have found a database of information about 80 million Americans. This database, which was identified by two hackers working in VPNMentor and working legally, found that 80 million households collecting and storing personal information such as age, gender, birth information, marital status and income status without permission. It also contains some encoded information. It is thought that this information may have very personal information such as people’s beliefs and orientations.
This information was discovered in a random cloud storage system when a web mapping project was executed. However, the teams could not identify the owner of this database. The result of this research shows that our personal data can be easily obtained by cyber attacks or even without us noticing it. This data can be used by hackers for activities such as theft, or can be used to provide data in many political or social campaigns.