The myth of the sophisticated hack

Andrew Peterson, Desmos, Oct 26, 2016
Commentary by Stephen Downes
files/images/man-in-middle-attack-8ef2a8d42b908f9ff543fc0ffa314e3f.png

Good article about hacking. It relevant as there has been a spike in recent activity, probably timed to coincide with the election (I'm hoping so; my own website is being caught in the crossfire). It's important to note, though, as this article makes clear, the majority of hacks are really very simply technologically. Hackers often go after the must vulnerable component: the user. Whether trying commonly used passwords, or tricking people into giving up personal information, these attacks rely not on technology but on social engineering. The article also looks at other attack types, such as the 'man in the middle', SQL injection, and endpoint attacks using USBs or mobile devices. If you're not familiar with these terms, read this article. I would have includes 'denial of service' (DOS, or DDOS) attacks, not because they're hacks (technically they're not) but because they're behind so much recent disruption.

Views: 0 today, 220 total (since January 1, 2017).[Direct Link]
Creative Commons License. gRSShopper

Copyright 2015 Stephen Downes ~ Contact: stephen@downes.ca
This page generated by gRSShopper.
Last Updated: Oct 21, 2017 02:41 a.m.