ANONYMOUS GROUPS WARNS ELON MUSK THE TOPIC IS ::- Tesla has stopped accepting bitcoin as a payment Tesla sold some bitcoin in the starting 2021 ANONYMOUS GROUP WHO IS ANONYMOUS ?? Anonymous is a decentralized international hactivist whose are known by its various cyber attacks against government institutions, agencies and church of scientology.. Anonymous websiteContinue reading “ANONYMOUS GROUP”
Category Archives: Uncategorized
BRUTE-FORCE ATTACK
WHAT IS BRUTE-FORCE ATTACK?? This attack based on trial-and-error to guess login info,encryption keys or find a hidden web page , Hackers work through all possible combinations hoping to guess correctly . WHAT IS HACKERS GAIN FROM BRUTE FORCE ATTACK?? Profiting from ads and collection your data Stealing personal data Hijacking your site from maliciousContinue reading “BRUTE-FORCE ATTACK”
DDOS ATTACK
DDOS ATTACK IS AS SIMILAR AS DOS ATTACK In a DDOS attack more traffic comes into a victim’s system on many different sources and the victim is impossible to stop their traffic the victims system can’t handle this traffic then crash their system … How to know your system is hacked by DDOS attack??? SlowContinue reading “DDOS ATTACK”
TROJEN HORSE
You protect your devices from trojen horse through some knowledge WHAT IS TROJEN HORSE ATTACK ? A trojen horse software is a malicious software look like a legitimate, but if any way it’s come in to your system then destroy all files.. HOW TO DETECT TROJEN VIRUS INTO YOUR SYSTEM ?? Press ctrl+alt+del When theContinue reading “TROJEN HORSE”
KEYLOGGER
Secure your online privacy through some knowledge WHAT IS KEYLOGGER ATTACK?? Keylogger is a spyware where hacker theft their all online information through a button(known keylogger) which is situated in keyboard layout. HOW TO PROTECT YOURSELF FROM KEYLOGGER ATTACK?? Use Anti key-logger software Keep antivirus protection Strong password policy Disable file access running and externalContinue reading “KEYLOGGER”
DOS ATTACK
DENIAL OF SERVICE ATTACK DOS attack used for crash victim system , when the hacker perform DOS attack he/she can used flooding I mean hacker create more traffic on victim website which is not handled by network system, and then crash the victim system , The dos attack used against high profile like banking, commercialContinue reading “DOS ATTACK”
PHISHING ATTACK
Firstly I clear that this type of theft is not done by hackers it will done only by crackers I mean black hat hacker who are a black spot for hackers … Phishing is a type of social engineering attack often used to steal user data , including login credential and credit card numbers.. HowContinue reading “PHISHING ATTACK”
RANSOMEWARE
Ransomeware is a type of attack in which the attacker locks and encrypt the victim data, important files and then demands a payment to unlock and decrypt the file.. The most famous ransomeware attack is wannacry which is done in 2017 , affected 150 countries and 20,000 computers and demanding 4$ bitcoin payment . HowContinue reading “RANSOMEWARE”
CYBER ATTACK
CYBER ATTACK
A cyber attack is an exploitation of computer system or networks. CYBER ATTACKS IS MORE TYPES TODAY WE TALK ABOUT MALWARE ATTACKS.. 1 . MALWARE Malware breaches a network through a vulnerability, typically when a user clicks on a dangerous link or email attachment files that then installed their system risky software which is stealContinue reading “CYBER ATTACK”
