MDIS Blog

Main Menu

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
Featured Full Width SliderFeatured PostInformation Technology
Home›Featured Full Width Slider›The Truth About Hacking In Five Minutes

The Truth About Hacking In Five Minutes

By MDIS
4th June 2018
2420
0
Computing hacking

Facebook, YouTube, Wikipedia, Amazon, Twitter, Instagram – all of these and even more web services, have become an integral and important part of our daily usage. Although these platforms are quite simple and easy to use, they all run a risk of being hacked. No one is insured against it or completely safe from this malicious intrusion.

However, what people can and must do to prevent such a possibility, is to understand and identify an obvious cyber threat towards their private data. Thus, the following questions arise: what exactly are the common methods used to exploit personal information, what is the reason behind it and most importantly, how to protect yourself against personal-based cyber-attacks?

Before answering any of the questions above, first let’s define what is hacking. Hacking is a process of an unauthorized intrusion inside a personal computer or organization network. A person who is not only using tools designed for hacking action, but understands the concept behind them and uses it to construct his own program, can be referred to as a hacker.

There are two characteristics of a hacker that have to be taken into attention and that is: determination and diligence. Both of these terms show on how focused and concentrated the person is, when he is performing an illegal act of hacking.

The general reason to why people turn to hacking is to steal and misuse information. Some of the common ways the information is misused are identity theft, bank money transaction, spamming, data leakage, blackmailing, etc. Just by knowing some of your major credentials details, such as bank account number, your full name and DOB, a hacker may be able to do a lot of damage.

Here are 3 common cyber attacks that occur to the regular users on the outer Web, along with the advice on how to identify them.

Table of Contents

  • 1) Fake phishing email from the “customer service”, with the malicious URL link.
      • The typical signs of such emails are:
  • 2) Hydracrypt – a type of Malware
    • 3) Man in the Middle – Interception of the communication medium by a 3rd party

1) Fake phishing email from the “customer service”, with the malicious URL link.

computing

Phishing – the act of sending the email to the targeted user, in order to create a false sense of authority and scam a person into giving his private data for identity theft. It is not only considered as a technical attack, but also a psychological one. The sense of urgency, authority, anger or any other feeling that can trouble the user and surrender his data to the attacker is a vital part of this attack.

The typical signs of such emails are:

• contain pictures or logos taken from the legitimate company website
• sender email address is close to a legitimate company, but slightly different from the official one.
• email will contain a link that will try to direct you to what you thought was the official website, but will actually direct you to a page where you enter your credentials

2) Hydracrypt – a type of Malware

computing guide

Malware is commonly known as a general term for malicious software that may be a Virus, Trojan, spyware or adware. Once they are installed on your PC, these kind of software can seriously affect your system security and person’s private data, as it will secretly relay your confidential information to the third parties.

Such malicious programmes may hide within other software that the user is trying to install. Users might not know that they have accidentally installed such malware. After the installation of such files, a user may experience a sudden drop in a system overall performance, advertisement windows appearing in the operating system and constant crashes on the internet browser. It is advisable, that before installing any unknown software, a user must have a good antivirus and malware detector installed.

3) Man in the Middle – Interception of the communication medium by a 3rd party

Man in the Middle (MITM) is a type of a cyber-attack where the communication between two systems is being either intercepted or monitored by another entity. Such silent eavesdropping may occur on any type of communication channel: email, online messaging, and web surfing by hijacking personal email or the browser session.

Whenever, such attack is undergoing, it is very hard to check whether any third party is involved in the middle of the communication medium. However, a very obvious and noticeable fact about MITM is the time delay within the transmission channel.

Despite being a very dangerous attack, it doesn’t really mean that a user cannot completely avoid it. For example, Multipurpose Internet Mail Extensions or MIME for short, allows user to encrypt the sending email, so that only receiving end can read it. Another instance would be to provide correct TLS or SSL certificates on the websites, by utilizing HTTPS protocol in your browser.

With continued advancement of Information Technologies, it will be vulnerable to hacking no matter how complex the systems are. What folks like me and you can do is to be aware of the existence of such cyber threats, keep the security of their systems up to date in order to reduce possible windows for cyber attacks or hacking.

Tagscybersecurity
Previous Article

MDIS School of Nursing: There really isn’t ...

Next Article

Special April: Reunion Party with MDIS Alumni

MDIS

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is one of Singapore’s oldest not-for-profit professional institutes for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Design, Health and Nursing, Health Sciences, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management. These programmes are offered in collaboration with renowned universities in the United Kingdom and the United States of America. MDIS also has set a proven track record of preparing students to excel in the Singapore-Cambridge General Certificate of Education (Ordinary and Advanced Level), Cambridge International General Certificate of Secondary Education (IGCSE) and Cambridge International Lower Secondary, through its comprehensive preparatory courses.

Related articles More from author

  • A damaged lock on a circuit board.
    Career ManagementInformation Technology

    Top 5 Career Opportunities after Cybersecurity Degree Course

    12th June 2023
    By Muhd Erfan
  • Top 10 Highest Paying Jobs
    Career ManagementFeatured PostUncategorized

    Top 10 Highest Paying Jobs in Singapore for 2022

    4th October 2021
    By MDIS
  • Featured PostStudent Life

    A Peek Into Dr Rama’s Life

    14th October 2021
    By MDIS
  • Fear
    CollegeFeatured BK RowFeatured Full Width Slider

    Fear x Disinterest: The Power Couple We Must Defeat

    11th April 2018
    By Gayathrii Nathan
  • hospitality
    Featured Full Width SliderFeatured PostTourism & Hospitality

    3 Things you probably misunderstood about Hospitality

    8th September 2017
    By Jireh Tay
  • Eiffel Tower
    Featured PostTourism & Hospitality

    Paris, The City of Love

    26th March 2018
    By MDIS

You may also like

  • autumn season
    Featured Full Width SliderFeatured PostMedia & Communications

    5 Must-Visit Places Around The World During Autumn

  • Working professional jotting notes during an online meeting.
    Business & ManagementCareer Management

    MBA vs Masters in Project Management: Tips & Differences

  • MDC

    Girls style Dance Workshop & MDIS Alumni Family Day

THINK SUCCESS. THINK MDIS.
Copyright© 2022. MDIS Blog. All Rights Reserved.
     
Where lifelong learning begins