Featured Post
7 Characteristics of WA Tapped and How to Overcome It, Watch Out for the Danger of Hackers!
Are you confused why suddenly the incoming WhatsApp chat has no notification ? Or are you curious why you can't use WhatsApp We...
Website hacked? Certainly not a pleasant experience. But not all hacking is bad huh, DomaiNesians, depending on the intent and purpose in hacking. There are hackers who look for problems in software or hardware, to then improve the quality of their products, but there are also hackers who look for weaknesses in security systems to steal data. But there is no harm in guard. To be clearer, the following will be discussed about what is a hack, how to recover, and how to maintain a website.
What is Hack?
Hack or hack is a term that is often considered negative, because it relates to breaking into a security system in a unique way. Hacking itself is an activity to hack the system, whether software or hardware, by using a back door system. According to Lyna Griffin in study.com hacking is an activity carried out by individuals, organizations, or countries to gain unauthorized access to computers and systems that depend on technology. Hacking activities can involve modification or changes to software or hardware to perform activities that are not intended by the creator. The term hacker first appeared around 1950. The name was used to describe those who work with computers, explore various details and test technology from various angles. Description of hacking or hackers leads more to negative things. But actually not all hackers carry out harmful hacking activities. Broadly speaking there are 3 types of hackers. Here are 3 types of hackers you need to know :
White Hat Hackers
White hat hackers are also called Ethical Hackers or ethical hackers. This type of hacker is often employed or contracted by companies and government agencies to look for system gaps or weaknesses, then improve the security system of the system. They use the same method as the black hat hackers, but white hat hackers have permission from the system owner, making all activities legal.
An example of a white hat hacker is Linus Trovalds. After years of experimenting with his computer system, he released Linux, a safe, open-source operating system.Gray Hat Hackers
Gray hat hackers are a blend of white hat hackers and black hat hackers. They will hack the system, look for weaknesses without permission from the owner of the system. But if something dangerous is found, they will give the information to the system owner. Usually they will also ask for compensation for their findings. Gray hat hackers are actually not dangerous, they just want to receive appreciation for the results they find. Eventually their activities will be labeled illegal, even though the dangerous findings will be shared in the end.
An example of a gray hat hacker is Marcus Hutchins. Marcus works at a cyber security company called Kryptos Logic, but the United States government believes that he also created the Kronos banking malware.Black Hat Hackers
Black hat hackers are someone who usually creates malware to carry out criminal activities. This type of hacker has many motivations such as financial gain, engaging in a campaign, protest, or just wanting to enjoy the sensation. Black hat hackers can be done by anyone, ranging from people who are just learning to people who are truly experts in hacking. After the target can be accessed, they will launch whatever motivation they have to hack, such as stealing data, manipulating or even destroying the system.An example of a black hat hacker is Kevin Mitnick. In the 1990s he was among the people wanted by the FBI. He stole millions of dollars of data from telecommunications companies and the National Defense warning system, and he hacked before the internet was actually used.
Conclusion
Hacked websites can be for various reasons. The most common cause is the lack of security for the website. Hackers are widely known for their illegal and harmful activities, but not all, depends on the motivation and legality of these activities. Hacking a website is not the end of everything. Although in the worst case you have to rebuild the infected website, therefore you must anticipate hacking by choosing a hosting provider that has the best security technology.
Bait and Switch
By using Bait and Switch, hackers can run malicious programs that can fool victims as genuine programs. After the victim installs the program on a device, the hacker can access the system on the device you are using.
Cookie theft
Cookies are small pieces of information stored on a site on the user's computer. The information is usually used as a reminder when users want to visit it again.
In a browser, cookies store personal information such as internet browsing history, usernames and keywords of the sites we access. Once you get access to cookie storage, a hacker can authenticate himself as a user in a browser.
ClickJacking
ClickJakcing is also known to have other names such as UI Redress. This type of attack is disguised as a UI (interface) in the form of a new layer that tricks its victims into clicking a button or link from another site's page. In other words, the hacker redirects the page that should be directed by the user to the pages of the site that become a trap of hackers .
Viruses, Trojans, and others
Virus or Trojan is a malicious program that is installed into the victim's system. Usually by using a virus or Trojan, hackers can obtain information that is owned by the victim.
phishing
Pishing technique is one method that is often used by hackers to trap victims. Hackers will make a replica of the most visited sites by making as close as possible to the original site.
Therefore, victims do not realize that the site they accessed is a scam site. Once a user logs in and fills in data, the hacker can get information from the target.