The device randomly crashing, rebooting or slowing down
Internet connections becoming slow (This is often due to the malware using up a lot of bandwidth to search online for other devices to infect)
Keyboard inputs being logged and sent to hackers. This can be very dangerous as the keys the user presses when entering important details, such as bank account passwords can be picked up by the hacker.
Once malware has entered one device on a network, it is very easy for it to spread to other devices on that same network via the server
The purpose of malware is usually to uncover sensitive information about a user such as their passwords.
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
A trial-and-error method used to crack passwords, login credentials, or encryption keys. It involves using automated software to generate a large number of consecutive guesses as to the value of the desired data.
The purpose is to gain access to cooperate systems or to steal sensitive data
They do not use a very sophisticated strategy, they usually use an algorithm to try out every possible password combination until they get the right one – hence the name "brute force attack".
The hacker overloads a company's server with a huge amount of useless requests in order to use up all of the server's bandwidth
This over usage of bandwidth prevents other genuine users from properly accessing the network
It can result in loss of access for genuine users, lost revenue for the company, lower productivity within the network, and damage to the company's reputation
The overall goal is to temporarily lower a company's profits and productivity and to permanently damage its reputation
With data interception, users and passwords are compromised, resulting in unauthorized access to systems. The main goal is to steal sensitive information such as usernames and passwords and to steal cooperate data.
Hackers often use a packet sniffer to pick up sensitive data (such as usernames and passwords) that are being transferred across two points on a network. These stolen login details can then be used to log into the network it what seems like a legitimate way.
With SQL injection hacks, the contents of a database can be output, revealing data that would otherwise be hidden. Data in the database can then be changed or deleted. The hacker can even add whole new files.