Techmoca
No Result
View All Result
Techmoca
No Result
View All Result
Techmoca
No Result
View All Result
Home News

These are the most common ways hackers will attack your computer

February 24, 2021
Reading Time: 5min read
Share on FacebookShare on Twitter

Data breach

  • Cybersecurity company Proofpoint is out with a new report analyzing the various techniques that are used by hackers to conduct data breaches, intrusions, and a variety of different cyber attacks.
  • One of the most common tools hackers employ is the use of social engineering.
  • Read on for a look at how these techniques work, and what you need to know to protect yourself.

Computer security has dominated tech news headlines in recent weeks, with reports of one hack and data breach after another as hackers get increasingly brazen and aggressive when it comes to different ways of stealing your information.

We’ve noted in previous posts some of the different steps you can take to make yourself less of a target in the next data breach, but in the meantime, researchers from the cybersecurity company Proofpoint have prepared a report that looks at some of the most common steps hackers take in order to break into your PC. They include phishing emails, whereby hackers trick users into opening messages and interacting with them in a way that triggers a malicious action. Indeed, the Proofpoint researchers warn in their report, for those of you not aware, that “email is by far the biggest channel for cyber attacks. We saw a wide range of email attack techniques in the fourth quarter, but almost all of them included some form of social engineering.”

Today’s Top Deal


Amazon shoppers are obsessed with these black AccuMed masks — and they've never been price this low!

Amazon shoppers are obsessed with these black AccuMed masks — and they’ve never been price this low!

Price: $19.99
You Save: $6.26 (24%)
Buy Now

These kinds of malicious emails can look like they come from your boss or a colleague, from a company you trust (these are some of the most likely to be impersonated, per ZDNet), as well as simply looking like a fake invoice or bill that you owe. A recent example: Some 10,000 Microsoft email users were recently caught up in a phishing attack, with messages that appeared to be from shippers like FedEx.

This is all a form of social engineering. Yes, there are technical components involved in the hack itself, but they are triggered by human error — such as by opening or clicking on a message you shouldn’t have. Social engineering is just a fancy way of saying that hackers tricked you, which is why IT teams at some big companies will often send out messages that look legitimate but are intended to trick employees into opening them. That lets the companies see how many employees would have been fooled if the threat had been real and serves as a training opportunity.

The Proofpoint team says that “social engineering,” if it was broken out as its own category, would easily be a component in 99% of all cyber attacks.

hand holding cell phone hacking
A hand is shown holding a cell phone against a background of computer code. Image source: terovesalainen/Adobe

Top “threat actors” according to Proofpoint, meanwhile, include:

  • State-sponsored attackers. This typically involves some degree of espionage on behalf of a government, and the goals could be diplomatic or military.
  • Cyber crime rings. These are group of hackers generally in it for the money, whether by stealing yours or performing some action for which a “ransom” is required to be paid.
  • Hacktivists. A much rarer kind of hacker, these are often looking to right perceived wrongs and to disclose secret information that the hacktivists believe should be made public.

The full Proofpoint report is definitely worth a read to get a sense of how some of the hacking attacks work, on a technical level. An example of another such technique is by locking malicious files behind a password, which can help it evade malware-detection programs. Then, all the hacker needs to do is give the password to the recipient and trick them into unlocking the file.

Today’s Top Deal


Sleek black KN95 masks that Amazon shoppers are obsessed with just hit the lowest price ever!

Sleek black KN95 masks that Amazon shoppers are obsessed with just hit the lowest price ever!

Price: $14.99
You Save: $2.00 (12%)
Buy Now

————————

Originally published at https://bgr.com/2021/02/23/data-breach-common-hacking-techniques-for-pcs/ on February 23, 2021 10:20 pm.

Related Posts

Healthcare cloud data solutions startup Redox raises $45M
News

Healthcare cloud data solutions startup Redox raises $45M

February 25, 2021
Government agencies investigate GameStop pump over potential illegal manipulation
News

GameStop shares surge in a repeat of the Reddit-powered pump in January

February 25, 2021
Elastic beats expectations in Q3 on strong SaaS growth
News

Elastic beats expectations in Q3 on strong SaaS growth

February 25, 2021
Google says it’s working to get ‘Hey Google’ working on Wear OS again
News

Google says it’s working to get ‘Hey Google’ working on Wear OS again

February 25, 2021
Amazon’s Lookout for Vision spots defects and anomalies in visual representations
News

Amazon’s Lookout for Vision spots defects and anomalies in visual representations

February 25, 2021
Pure Storage and NetApp beat expectations thanks to strong cloud storage growth
News

Pure Storage and NetApp beat expectations thanks to strong cloud storage growth

February 25, 2021

Recommended

Suit targets Nintendo over Switch ‘Joy-Con drift,’ seeks damages for U.S. kids who bought console

Suit targets Nintendo over Switch ‘Joy-Con drift,’ seeks damages for U.S. kids who bought console

November 25, 2020
Boast.ai raises $23M to help businesses get their R&D tax credits

Boast.ai raises $23M to help businesses get their R&D tax credits

December 26, 2020
Google is shutting down its in-house Stadia game development studios

Google is shutting down its in-house Stadia game development studios

February 1, 2021
The VC and founder winners of DoorDash’s IPO

Scalarr raises $7.5M to fight mobile ad fraud

February 10, 2021
The VC and founder winners of DoorDash’s IPO

Will this time be any different for Twitter?

January 27, 2021
Why Do Most Digital Marketing Strategies Fail?

Why Do Most Digital Marketing Strategies Fail?

December 21, 2020

© 2020 Techmoca. We aggregate tech news around the world

No Result
View All Result
  • Homepages
    • Home – Layout 1
    • Home – Layout 2
  • Reviews
  • Devices
  • Games

© 2021 JNews - Premium WordPress news & magazine theme by Jegtheme.