I AM WHITE HACK
1). Malware
Malware is a type of application that can perform a variety of malicious tasks. Some strains of malware are designed to create persistent access to a network, some are designed to spy on the user in order to obtain credentials or other valuable data, while some are simply designed to cause disruption.
Some forms of malware are designed to extort the victim in some way. Perhaps the most notable form of malware is Ransomware – a program designed to encrypt the victim’s files and then ask them to pay a ransom in order to get the decryption key.
2). Phishing
A Phishing attack is where the attacker tries to trick an unsuspecting victim into handing over valuable information, such as passwords, credit card details, intellectual property, and so on.
Phishing attacks often arrive in the form of an email pretending to be from a legitimate organization, such as your bank, the tax department, or some other trusted entity.
Phishing is probably the most common form of cyber-attack, largely because it is easy to carry-out, and surprisingly effective.
3). Man-in-the-middle attack (MITM)
A man-in-the-middle attack (MITM) is where an attacker intercepts the communication between two parties in an attempt to spy on the victims, steal personal information or credentials, or perhaps alter the conversation in some way.
MITM attacks are less common these days as most email and chat systems use end-to-end encryption which prevents third parties from tampering with the data that is transmitted across the network, regardless of whether the network is secure or not.
4). Distributed Denial-of-Service (DDoS) attack
A DDoS attack is where an attacker essentially floods a target server with traffic in an attempt to disrupt, and perhaps even bring down the target. However, unlike traditional denial-of-service attacks, which most sophisticated firewalls can detect and respond to, a DDoS attack is able to leverage multiple compromised devices to bombard the target with traffic.
5). SQL injection
SQL injection is a type of attack which is specific to SQL databases. SQL databases uses SQL statements to query the data, and these statements are typically executed via a HTML form on a webpage. If the database permissions have not been set properly, the attacker may be able to exploit the HTML form to execute queries that will create, read, modify or delete the data stored in the database.
Invited by: Vino Liya
if the data has not been changed, no new rows will appear.
Day | Followers | Gain | % Gain |
---|---|---|---|
January 03, 2024 | 215 | -1 | -0.5% |
October 03, 2022 | 216 | -2 | -1.0% |
August 12, 2022 | 218 | -2 | -1.0% |
July 06, 2022 | 220 | +1 | +0.5% |
May 30, 2022 | 219 | -6 | -2.7% |
April 22, 2022 | 225 | -3 | -1.4% |
March 14, 2022 | 228 | -4 | -1.8% |
December 09, 2021 | 232 | -1 | -0.5% |
November 01, 2021 | 233 | -3 | -1.3% |
September 25, 2021 | 236 | +180 | +321.5% |