Common Hacking tips
1. Malware: software used to gather sensitive information or gain
access to private computer system.
2. Black hat hacker: Anyone who illegally breaches a device with
malicious intent.
3. Phishing: Sending fraudulent emails to infect devices and steal
information.
4. Zero-day: A flaw in software on our personal devices, that is
unknown and can be hacked.
5. Crowd-sourcing: connecting a group of personal devices to
perform a specific task.
6. Hospitality hack: hacking a hotel’s computer network to prey on
an employees and guests.
7. Spoofing: A device or program is manipulated to masquerade as
another.
8. Location services: Software on your smart devices that
constantly tracks your precise location.
9. Juice jacking: invasion of your personal devices while you are
simply charging your battery.
10. Malvertisment: An infected online ad that redirects an
unsuspecting user to a malicious site.
11. Game transfer Phenomena: When games believe they can mimic the
physical abilities of their online avatar in the real world.
No comments:
Post a Comment