Tuesday, October 4, 2016

Hack a computer with an image.


        Taking control over computer is a real time challenge for hackers these days. Hacking a computer is a tedious job if configured properly but the only way one can gain access is to use the well known weak link.

         Users are considered to be the weakest link in the cyber domain because one cant change the functionality of the system if configured well and in operation, whereas user who operate the system can do anything and has no restrictions.

         There is a separate section known as Social Engineering which exploits human trust and therby taking control over computer or device.

         Consider you are receiving an email stating "You have won 3.5 crores as prize and to redeem fill the form" 5 out of 10 will give away details as per survey conducted. Even a blank PDF file can be a malware in cyber space.

          It is now JPEG as it is easy to transmit and easy to fool users. Using malicious JPEG an attacker can take control over your system. Best way to spread Ransomware is to send malware through email attachment.

          Many are falling to Ransomware these days it is recommended to have a backup of files always. Use offline storage or Cloud storage to save sensitive data. 

          Users are recommended not to open email from unknown sources and simply delete them if it contains any attachment in any form (PDF, JPEG, DOC). Even a doc file with macro enabled can harm your system.

P.S: The post is to create an awareness and not to create any negative impact.

1 comment: