BY-HITESH THAKUR

Method 1: The Keylogger--
A keylogger is probably one of the most effective and popular ways to hack all kinds of information. Though some services are so strong that even the most talented hacker would have trouble finding vulnerabilities, more often than, all of these security features can be undone with a keylogger.
A keylogger is a type of software (or hardware) that runs in the background of the target’s computer, and it records every single keystroke they enter. Though many advanced hackers employ complex methods of installing keyloggers remotely, such as embedding the program in P2P file downloads and other types of software, even novices can install these programs if they have access to the target’s computer. However, some keylogger programs have tools that help the attacker complete the installation remotely, such as Realtime-Spy.
And hardware keyloggers are even easier to install, because they typically look like a PS2 jack of USB flash drive that can easily be inserted into the back of a desktop computer – without the target being any the wiser. Many of them are even undetectable by the latest antirust and anti-spyware software.
Method 2: Phishing
Phishing still remains and extremely effective way for hackers to steal login credentials, payment card information, and a multitude of other types of data. Essentially, the hacker tries to setup a website (with a bogus URL) that looks and behaves exactly like another website – which is Gmail in this scenario. All the attacker really needs to do is copy the web code from the login screen, add a small amount of PHP code, and then harvest usernames and passwords.
After the false phishing site has been setup, the hacker then sends links to the bogus site to all of their victims. A careless user won’t see that the URL is slightly different and consequently send their username and password straight into the hands of the attacker. Then the phishing site typically redirects the user to the genuine site to avoid suspicion. Though there are a lot of phishing filters and web URL blacklists that attempt to stamp out phishing, there are always new phishing sites popping up and there is nothing we can do to eliminate them completely.
0 Comments