• How to Protect Against a Keylogger
  • Cookie theft
  • Ways to Defend Against Waterhole Attack




    Download 6,34 Mb.
    Pdf ko'rish
    bet76/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   72   73   74   75   76   77   78   79   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Ways to Defend Against Waterhole Attack
    ❖ 
    Two-factor authentication – You will find what they steal your passwords and username.
    To prevent being attacked use two-factor authentication which, makes it hard for them to
    guess the codes or any other way used in this way.
    ❖ 
    Disable tools vulnerable to watering hole – Some software is easily affected or vulnerable
    to attacks so if possible, remove them. Some of this software is adobe’s flash.
    ❖ 
    Security audit – Depending on which country you are, you can decide to get a security
    audit in one of the companies well known in IT services.
    ❖ 
    Update software – Attackers take advantage of hacking a system because of not updating
    software regularly. Security is key for every business database so keep updating some of the
    software on your computer or else you become a victim of hacking.
    ❖ 
    Monitor network – Have a regular update monitoring, this helps you keep track of those
    people visiting the site. SSL – traffic checker can help you do that.
    Keylogger – It is also called a monitoring software. It is like a CCTV that monitors every
    activity taking place loggings, downloads, chats, etc. They do that by logging into your
    keyboard so that you do not suspect that anything is going on. They can access sensitive
    information such as credit card numbers, passwords and things like account information.
    Keylogging can be done in a positive way, like parents monitoring their children from going
    to dangerous sites that may lead to cyber crimes and frauds. Sometimes it might be difficult to


    detect if you have a keylogger. You can note when your keyboard keeps redirecting you to a
    certain site, slower performance than usual or screen error messages .
    How to Protect Against a Keylogger
    ❖ 
    Password manager – Most of these password managers use the feature of autofill that helps
    you remember the password. But did you know this is dangerous? Yes, hackers can save the
    password. Although some keyloggers save passwords when typed on keyboards, it is good to
    check whether if your computer/system has this suspicious keylogger. As a company, a
    keylogger can be used to check unusual activities.
    ❖ 
    Be cautions – This happens almost to everyone where you receive links from unknown
    people. Some of these links are infected and are sent to prompt you to click them. The click
    of those links is the beginning of the hacking. You’ll find once you click on these links your
    computer starts misbehaving or redirecting to specific sites.
    ❖ 
    Keyboard layout – Perhaps, try to change the design of your computer. Keylogger is
    available in QWERTY layout, try changing it to DVORAK. This is because it becomes hard
    to convert the captures in that layout.

    Security tools – To put extra security measures in your computer, you need to put
    additional security tools. Some tool like Ghost press is an anti-keylogger that stops other
    programs from running behind the system without knowing.
    ❖ 
    Change passwords – In case you suspect someone is logging to your mails then try to put
    the hard password but easy to remember. A hacker may steal your password and not
    necessarily use it immediately. Keep changing your password just in case in future he tries to
    hack the system unexpectedly.
    Cookie theft – Cookie data is available when in transit. It is always sent in the form of
    headers in sites this makes them vulnerable to attackers. In public places, this becomes riskier
    since they access easily.

    Download 6,34 Mb.
    1   ...   72   73   74   75   76   77   78   79   ...   203




    Download 6,34 Mb.
    Pdf ko'rish