Black Hat Hacker Tactics

Posted by Stefanie Kober Wed, 30 Apr 2014 11:18:00 GMT

You’ve probably heard of phishing, the hacker tactic where web pages and e-mails that are masqueraded as a trustworthy entity, but are you familiar with tactics such as “pharming,” “doxing” and “spoofing”?

Although they may sound like new dance moves, in reality these stealthy and conniving black hat hacker tactics are gaining popularity and attacking more and more individuals and enterprises by the minute.

Check out 7 hacker tactics to be aware of below.

  • Baiting – Being tricked into using an USB drive or other form of electronic media that is pre-loaded with malware
  • Click Jacking – Concealing hyperlinks beneath legitimate clickable content which, when clicked, downloads malware or perform actions
  • Pharming – redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data
  • Social Engineering – Strategic use of conversation to extract information from people without giving them the feeling they are being interrogated
  • Cross-Site Scrapping – Malicious code is injected into a website you trust
  • Doxing – publicly releasing a person’s sensitive, identifying information, typically retrieved from social networking sites
  • Spoofing – Deceiving computers or users by hiding or faking one’s identity by utilizing a fake email address or simulating a genuine email address

Hackers have allegedly attacked everything from U.S. media, financial institutions, social media websites and more. The aftermath of a hack can be a serious headache for your company’s IT team as it poses a threat to your information, customers and reputation. Stay aware of these hacker tactics and protect your sensitive data!

Has your company ever experienced a hack? What did your team learn from it? Please share in the comments below.

no comments |

You must be registered in order to write comments. To register as a new user click here.

If you're already registered, please leave a comment here

Leave a comment