HACKING IN SHEEP’S C LOATHING:
• One method info is attained to hack into computers and email accounts is social engineering. This is considered a revolutionary art among computer hackers.
• Social engineering tricks someone into believing that he is giving information to someone who has the authority to ask for it.
• People can also fall prey to social engineering through online or real-life interaction. Online, the hacker can obtain information through chatting, email exchanges, message boards and so on. In real life, a conversation can be struck up with a potential victim.
• An ingenious method involves creation a web page where users are required to enter their email address and password to supposedly find out if someone has deleted or blocked them from accessing messenger services.
• Another common way is through the telephone. A user may receive a call from someone identifying himself as a system administrator of his company.
TROJAN ATTACK: THE TRADITIONAL HACK
• Specially devised programs, called windows keyloggers, are surreptitiously installed in the victim’s computer.
• These programs can come through backdoor Trojans and viruses. A downloaded video clip, an innocuous b’day greeting or an email could carry them.
• Once inside, the Keylogger will auto execute and recorded keystrokes made by the user and transfer email addresses and passwords to the hacker.