User Tools

Site Tools


ci2011:security_attacks

This is an old revision of the document!


Security Attacks

There are all kinds of Security Attacks out there. A few are listed below:

  • Black Hat
  • BlueBugging
  • Botnet (Zombie PCs)
  • Crapware
  • DoS (Denial of Service)
  • Hacker Attacks
  • Keylogging
  • Logic Bomb
  • Phishing
  • Pod Slurping
  • Ransomware
  • Scareware
  • Script Kiddies
  • Sidejacking
  • Smishing
  • Social Engineering
  • Trojan Horse
  • Virus
  • White Hat
  • Worm

Black Hat: Black Hat is a group of hackers that attack computer systems and use computers to attack systems for profit, for fun, or for political motivations. They also utilize botnets to deliver viruses and worms.

BlueBugging: BlueBugging is when someone illegally accesses a cellular phone using Bluetooth wireless technology. This would allow the hacker to make phone calls and to do texting via bluetooth that they BlueBugged into. This type of attack can only occur when the hacker and cellphone are within range of each other which is about 30 feet.

Botnet (Zombie PCs): Botnet is the combination of Robot and Network. Botnet computers are Internet computers that inconspicuously forward email, worms, viruses, and spam across the Internet without the users knowledge.

See e.g.: http://lifehacker.com/5749098/the-computer-attacks-youve-never-heard-of

ci2011/security_attacks.1299262185.txt.gz · Last modified: 2011/03/04 13:09 (external edit)