Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added blog on the What-is-Hacking #306

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
87 changes: 87 additions & 0 deletions src/pages/blog/What-is-Hacking.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
---
title: "What is meant by hacking ? How to avoid it too"
excerpt: "Finding and then using a computer system or networks vulnerabilities to hack is the act of trying to obtain unauthorized access to someone else s or an organization s data. Although hacking is not always harmful the phrase has a bad reputation because of its connection to online crime."
publishDate: "2023-08-04T01:05:36.020Z"
image: "https://imgs.search.brave.com/xhLg3RWlRYWVfy8ik7AclmIJndKnvs-3Wodd0qKW1xA/rs:fit:860:0:0/g:ce/aHR0cHM6Ly90NC5m/dGNkbi5uZXQvanBn/LzAyLzMwLzA2LzEz/LzM2MF9GXzIzMDA2/MTMzOV9JaVJtY0k0/MXc3ZHd1VTI5TWda/YWdaWGdITkF4SkU1/Ui5qcGc"
category: "What is meant by hacking ? How to avoid it, too"
author: "Himanshu Narware"
layout: "@layouts/BlogLayout.astro"
tags: [Hacking,Cyber Attack, Malware]
---
Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.

## Hacking
Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.

![screely-1667833660447.png](https://imgs.search.brave.com/IAMslgyaowPVH9TTzfV6BAEz93KD0NwMSvJ7UFBlfnk/rs:fit:860:0:0/g:ce/aHR0cHM6Ly90NC5m/dGNkbi5uZXQvanBn/LzAyLzI1LzUyLzQx/LzM2MF9GXzIyNTUy/NDEwOF9OYWdpQVpk/NU1JWUZkdmRBVlNt/MGxFSW5yM0R2djVw/OC5qcGc)

## How does hacking work?
So, how do hackers hack? Hackers use a variety of techniques to achieve their aims. Some of the most common methods include:

## Social engineering

Social engineering is a manipulation technique designed to exploit human error to gain access to personal information. Using a fake identity and various psychological tricks, hackers can deceive you into disclosing personal or financial information. They may rely on phishing scams, spam emails or instant messages, or even fake websites to achieve this.

## Hacking passwords

Hackers use different ways to obtain passwords. The trial and error method is known as a brute force attack, which involves hackers trying to guess every possible combination to gain access. Hackers may also use simple algorithms to generate different combinations for letters, numbers, and symbols to help them identify password combinations. Another technique is known as a dictionary attack, which is a program that inserts common words into password fields to see if one works.

![screely-1667833660447.png](https://imgs.search.brave.com/c6U-NAN1orZOHkqh7qEQmTGVv_cHcRTpVQmc9JsO30A/rs:fit:860:0:0/g:ce/aHR0cHM6Ly9tZWRp/YS5nZXR0eWltYWdl/cy5jb20vaWQvODk5/ODYxNzA0L3Bob3Rv/L2hhY2tlci13b3Jr/aW5nLWFsb25lLmpw/Zz9zPTYxMng2MTIm/dz0wJms9MjAmYz0z/U1hkRDdIR3RtZU92/Y1V5cFFFVV9vdDJ6/cGRUUl9DSVBvcU83/aWxVWWxnPQ)
## Infecting devices with malware

Hackers may infiltrate a user’s device to install malware. More likely, they will target potential victims via email, instant messages and websites with downloadable content or peer-to-peer networks.

Exploiting insecure wireless networks

Rather than using malicious code to infiltrate someone’s computer, hackers may simply take advantage of open wireless networks. Not everyone secures their router, and this can be exploited by hackers driving around looking for open, unsecured wireless connection. This is an activity known as wardriving. Once hackers are connected to the unsecured network, they only need to bypass basic security to gain access to devices connected to that network.

## Gaining backdoor access

Hackers may create programs that search for unprotected pathways into network systems and computers. Hackers may gain backdoor access by infecting a computer or system with a Trojan horse, created by hackers to acquire and steal important data without the victim noticing.

## Spying on emails

Hackers can create code which allows them to intercept and read emails. Most email programs today use encryption formulas which mean that even if hackers intercept a message, they can't read it.

## Logging keystrokes

Some programs allow hackers to track every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything they need to infiltrate a system or steal someone’s identity.

## Creating zombie computers

A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes a seemingly innocent code, a connection opens between their computer and the hacker's system. The hacker can then secretly control the victim’s computer, using it to commit crimes or spread spam.

## What harm might hackers cause?
1. Cybersecurity hacking can have devastating effects. Regardless of the method hackers employ, once they have accessed your data or devices, they can:

2. Open credit card and bank accounts in your name, then steal your money.
ruin your credit score
3. ask for a new account PINs for personal identification or supplementary credit cards
4. Purchase things on your behalf
5. Add yourself or a controlled alias as an authorized user to make it simpler to utilize your credit Obtain payday loans
6. Utilize and misappropriate your Social Security number
7. Sell your information to third parties who will use it nefariously.
8. On your computer, delete or corrupt crucial files.
9. Obtain sensitive personal information, release it publicly, or threaten to do so

![screely-1667833660447.png](https://imgs.search.brave.com/6oQnPgrKZJkIGKBR-mR7OGCxP6utWamawzYkOM1l0fg/rs:fit:860:0:0/g:ce/aHR0cHM6Ly9zdDMu/ZGVwb3NpdHBob3Rv/cy5jb20vMjU3MjU2/MS8xNjM1Mi9pLzYw/MC9kZXBvc2l0cGhv/dG9zXzE2MzUyMzA5/Mi1zdG9jay1waG90/by1kYW5nZXJvdXMt/aG9vZGVkLWhhY2tl/ci1icmVha3MtaW50/by5qcGc)

## Hacking prevention
You can protect yourself against hackers by following good cybersecurity hygiene. Here are some key hacking prevention tips to bear in mind:

Use strong passwords

A big part of hacking is getting hold of users' passwords. It is therefore essential to use a strong and unique password for each online account. A strong password is made up of at least 12 characters – ideally more – and is a mix of upper- and lower-case letters, numbers and special characters. It can be difficult keeping track of multiple passwords, so using a password manager can help.

1. Use multi-factor authentication (MFA)

Turn on two-factor or multi-factor authentication for as many of your online accounts as possible. MFA uses a second piece of information – often a code generated by an app or sent via SMS – alongside a password, adding another layer of security to your accounts.

2. Be vigilant against phishing

Successful hacking often starts with phishing emails or texts. Be alert: when a new email or text message arrives, and it includes a link or attachment, our initial instinct can often be to click or tap on it. Avoid this temptation – don’t open messages from unknown senders, never click on a link or open an attachment in an email you’re not sure about and delete messages you suspect to be spam.

**Follow Me on [Twitter](https://twitter.com/N_Himanshu_)**
**Follow Me on [Linkedin](https://www.linkedin.com/in/himanshunarware/)**