The myth of the sophisticated hack

Andrew Peterson, Desmos, Oct 26, 2016
Commentary by Stephen Downes

Good article about hacking. It relevant as there has been a spike in recent activity, probably timed to coincide with the election (I'm hoping so; my own website is being caught in the crossfire). It's important to note, though, as this article makes clear, the majority of hacks are really very simply technologically. Hackers often go after the must vulnerable component: the user. Whether trying commonly used passwords, or tricking people into giving up personal information, these attacks rely not on technology but on social engineering. The article also looks at other attack types, such as the 'man in the middle', SQL injection, and endpoint attacks using USBs or mobile devices. If you're not familiar with these terms, read this article. I would have includes 'denial of service' (DOS, or DDOS) attacks, not because they're hacks (technically they're not) but because they're behind so much recent disruption.

Views: 2 today, 321 total (since January 1, 2017).[Direct Link]