These are the most common ways hackers will attack your computer – Moloft


568
568 points


  • Cybersecurity company Proofpoint is out with a new report analyzing the various techniques that are used by hackers to conduct data breaches, intrusions, and a variety of different cyber attacks.
  • One of the most common tools hackers employ is the use of social engineering.
  • Read on for a look at how these techniques work, and what you need to know to protect yourself.

Computer security has dominated tech news headlines in recent weeks, with reports of one hack and data breach after another as hackers get increasingly brazen and aggressive when it comes to different ways of stealing your information.

We’ve noted in previous posts some of the different steps you can take to make yourself less of a target in the next data breach, but in the meantime, researchers from the cybersecurity company Proofpoint have prepared a report that looks at some of the most common steps hackers take in order to break into your PC. They include phishing emails, whereby hackers trick users into opening messages and interacting with them in a way that triggers a malicious action. Indeed, the Proofpoint researchers warn in their report, for those of you not aware, that “email is by far the biggest channel for cyber attacks. We saw a wide range of email attack techniques in the fourth quarter, but almost all of them included some form of social engineering.”

READ More:  Intel's unreleased i7-11700K is being sold and shipped in Germany

Today’s Top Deal Amazon shoppers are obsessed with these black AccuMed masks — and they’ve never been price this low! List Price:$26.25 Price:$19.99 You Save:$6.26 (24%) Available from Amazon, Moloft may receive a commission Buy Now Available from Amazon Moloft may receive a commission

These kinds of malicious emails can look like they come from your boss or a colleague, from a company you trust (these are some of the most likely to be impersonated, per ZDNet), as well as simply looking like a fake invoice or bill that you owe. A recent example: Some 10,000 Microsoft email users were recently caught up in a phishing attack, with messages that appeared to be from shippers like FedEx.

This is all a form of social engineering. Yes, there are technical components involved in the hack itself, but they are triggered by human error — such as by opening or clicking on a message you shouldn’t have. Social engineering is just a fancy way of saying that hackers tricked you, which is why IT teams at some big companies will often send out messages that look legitimate but are intended to trick employees into opening them. That lets the companies see how many employees would have been fooled if the threat had been real and serves as a training opportunity.

READ More:  This is the mind-blowing moment in ‘WandaVision’ episode 8 that everyone’s talking about – Moloft

The Proofpoint team says that “social engineering,” if it was broken out as its own category, would easily be a component in 99% of all cyber attacks.

hand holding cell phone hacking
A hand is shown holding a cell phone against a background of computer code. Image source: terovesalainen/Adobe

Top “threat actors” according to Proofpoint, meanwhile, include:

  • State-sponsored attackers. This typically involves some degree of espionage on behalf of a government, and the goals could be diplomatic or military.
  • Cyber crime rings. These are group of hackers generally in it for the money, whether by stealing yours or performing some action for which a “ransom” is required to be paid.
  • Hacktivists. A much rarer kind of hacker, these are often looking to right perceived wrongs and to disclose secret information that the hacktivists believe should be made public.
READ More:  Will you need a new coronavirus vaccine every year? Here’s what Pfizer’s CEO says – Moloft

The full Proofpoint report is definitely worth a read to get a sense of how some of the hacking attacks work, on a technical level. An example of another such technique is by locking malicious files behind a password, which can help it evade malware-detection programs. Then, all the hacker needs to do is give the password to the recipient and trick them into unlocking the file.

Today’s Top Deal FDA EUA-authorized KN95 masks are priced so low at Amazon, you won’t believe it! Price:$21.60 ($2.16 / Count) Available from Amazon, Moloft may receive a commission Buy Now Available from Amazon Moloft may receive a commission

Andy is a reporter in Memphis who also contributes to outlets like Fast Company and The Guardian. When he’s not writing about technology, he can be found hunched protectively over his burgeoning collection of vinyl, as well as nursing his Whovianism and bingeing on a variety of TV shows you probably don’t like.



Source link


Like it? Share with your friends!

568
568 points