How do hackers hack companies like google
now in this video i am going to tell you about
the ways that hackers use to hack companies
like google.
even though companies that are considered
to be most secured also face data breaches
if you don't know what a data breach is it's
nothing but leakage of highly confidential
information by hackers.
this happens because even the highly secured
ones have bugs in them all that hackers do
is finding that bug and making it an opportunity
to enter into the system and thereby leaking
the information.
Watch this video for more information:https://youtu.be/QdZKnTHOI1w
Recently personal data of
29 million indian job seekers leaked on dark web
google and facebook also faced databreaches
in the past years.
If you think your personal information is
safe online you are absolutely wrong .
Breaches happen on almost daily bases exposing
our email addresses passwords credit card
numbers ,social security numbers and other
highly sensitive information.
How hackers manage to do this
SQL injection
websites in which hackers had already found
a bug. They will implant a piece of code on thatwebsite so that anyone who comes on that website will be immediately infected
Now hackers can remotely scan servers to determine vulnerabilities within that system.
Once they find vulnerability, they exploit
it by sending a command or data to the server that will cause the application to crash and
will then start executing code.
Social engineering attack
Here hackers target a specific person for
example a person who is working in the targeted
organisation.
then the hacker trick the victim and sends
a malicious link in a compromising way
Once you open the attachment or click on the
link, a vulnerability in the system’s application
such as a word processor or browser will be
exploited.
Malicious software, known as malware, will
then start executing on the machine and open
up a communication channel to the hacker to
allow them to browse and control the system.
USB Key Malware
Malware can also get onto a computer through
a USB key.
. Once the unsuspecting person plugs the key
into his or her machine, malware is installed.
It can also be surreptitiously inserted into
a computer by a spy on the inside of a company.
now the hacker is entered into the system and now he is capable of hacking the systems within the same network and can leak sensitive
information
0 Comments