5 new types of online attacks that need to be prevented by hackers in the web era

Source: Internet
Author: User

Social networksFar from being the onlyHackerTarget website. Amazon, a giant electronic retail website, is also opening a door for hackers. Hackers can use it to steal users' passwords and access their credit card information.

The following are five new attacks:

1. Click hijacking

AttackOne of the most common ways for social network users is click hijacking. This type of attack usually creates a new malicious page on a real link to replace the real page with a completely different page. This scam is usually spread by sharing the content to display the status update. Similarly, domestic social network users should guard against this type of attacks.

In fact, you can simply pay attention to the e-mail address of the sent message to find the cat. The lesson here is obvious: When you click a link to send an email, pay attention to the sender's address. If it looks abnormal, delete it. In addition, make sure that your browser is in the latest version. Why not take advantage of their protection functions?

2. False Investigation

This type of scam is associated with clickjacking because it attempts to lure you into clicking a dangerous message through misleading information. Generally, such scams start with an attractive message. Here is an example:

"Oh, my God! Check what the child did to his school after being dismissed! He went crazy after the 11-year-old boy was dismissed from school !" Well, this type of news is usually attractive.

Then, you must share this page and enter a short comment before you can read this page. Alas: Now you have entered the trap set by the scammers, which will help them spread the scam to all your friends. After this investigation, you can earn money for these scammers. This is why such messages gradually spread to social networks.

3. Thieves applications

More seriously, counterfeit investigations may connect to a malicious application. Sometimes these applications look for your address book and send fake surveys to all of them to earn money. Other rogue hijacking applications can hijack data by installing a keyboard recorder (an application that records and transmits the order of keys) or other malware. Other fake apps can turn your computer into a zombie computer used to broadcast malware.

4. Amazon Vulnerabilities

This is a security vulnerability that allows company servers to receive almost but not completely correct passwords. Fortunately, this vulnerability only affects old passwords.

This vulnerability allows Amazon servers to accept invalid passwords. For example, adding a password with other characters after the 8-bit password makes the password case insensitive. This vulnerability disappears the advantage of a long password, which can be easily cracked by software.

The new password will not be affected under any circumstances, but it is not clear what the deadline is. In any situation, you can easily change the account password of Amazon. If you like it, you can change it to the same password, but it is still a brand new password and secure for the backend server.

5. Phishing (Phishing)

In this case, it is usually through a normal email, but users may also be hit by messages from Facebook or Twitter. Phishing is like this: you will first receive a very private email or message from someone or company you often communicate. However, this message will lead you to a poisoned website. Yes, it sounds like a "phishing" that users have been preventing ". These messages are typically disguised as reminders that the inbox is full. The fish-and-fork phishing service adds personal information to paralyze users. Chinese users need to watch out for fake messages from social networks and Weibo friends.

Sophos said: "common phishing messages are usually displayed from a large, well-known enterprise or site that usually has a broad membership base, such as EBAY or PayPal. In the case of phishing, the source of the email is usually displayed as from the company where the recipient is located or a superior in the company ."

The application of social networks is already common, but the subsequent hacker attacks continue. I hope you can learn more about this aspect.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.