~

Who are Computer Hackers?

By Ruwan Weerakoon

(Lanka-e-News -24.April.2026, 4.15 AM) Computer hackers are individuals who use programming, computer knowledge, and technical skills to gain unauthorized access to systems or data. They can be categorized into different types:

1. White-hat hackers: Ethical hackers who help organizations improve their security.
2. Black-hat hackers: Malicious hackers who exploit vulnerabilities for personal gain.
3. Gray-hat hackers: Operate in between, often identifying vulnerabilities without permission but without malicious intent.
Methods of Hacking

Common methods of hacking include:

1. Phishing: Deceptive emails or messages designed to trick users into sharing sensitive information.
2. Malware: Malicious software that infects systems to steal data or damage files.
3. Social Engineering: Manipulating individuals into divulging confidential information.
4. SQL Injection: Exploiting vulnerabilities in web applications to manipulate databases.
5. Brute Force Attacks: Trying multiple passwords until the correct one is found.

Can Bank Accounts Be Hacked?
Yes, bank accounts can be hacked using various methods, often targeting both the technology used and the individuals involved (social engineering, phishing, etc.).

Can Online Bank Accounts Be Hacked?
Yes, online banking accounts are also susceptible to hacking. Cybercriminals often use methods like phishing, malware, and credential stuffing attacks to gain access.

 How to Prevent Hacking of Computers
1. Use Strong Passwords: Combine letters, numbers, and symbols.
2. Update Software Regularly: Keeping systems up to date protects against known vulnerabilities.
3. Install Antivirus Software: Use reputable security software and keep it updated.
4. Use Firewalls: Protects against unauthorized access.
5. Be Cautious with Emails: Don't click on unknown links or attachments.

How to Prevent Online Banking Account Hacking
1. Enable Two-Factor Authentication (2FA): Adds an extra layer of security.
2. Use Strong, Unique Passwords: Avoid reusing passwords across sites.
3. Monitor Accounts Regularly: Look for unauthorized transactions.
4. Avoid Public Wi-Fi for Banking: Use secure, private networks.
5. Educate Yourself: Stay aware of common phishing and hacking techniques.

Can Mobile Phones Be Hacked?
Yes, mobile phones can be hacked using methods like malware, phishing, and exploiting vulnerabilities in mobile operating systems and apps.

Can WhatsApp Accounts Be Hacked?
Yes, WhatsApp accounts can be compromised through methods like SIM swapping, malware, or exploiting security gaps in the app.

 Is Cyber Crime Increasing in the World?
Yes, cybercrime is on the rise globally, with increasing incidents of hacking, data breaches, and fraud. This increase is driven by factors like the growth of the internet, the rise in digital transactions, and the increasing sophistication of cybercriminals.

 In Which Countries is Cybercrime Most Affecting?
Cybercrime tends to affect countries with high internet penetration and digital services. Dangerous hotspots often include:

- United States: High reported incidents due to its digital economy.
- India: Growing rapidly due to technological adoption.
- China: High levels of cybercrime, often state-sponsored.
- Russia: Known for various forms of hacking and cyber threats.
- Brazil: Increasing incidents related to online fraud and data breaches.

Countries with less robust cybersecurity infrastructure may also experience high levels of cybercrime, even if they have lower internet usage.
Common hacking techniques used by cybercriminals to exploit vulnerabilities in systems and networks include:

1. Phishing
- Description: A method of deceiving individuals into providing personal information, such as usernames and passwords, by disguising oneself as a trustworthy entity.
- Variants: 
- Spear Phishing: Targeted attacks on specific individuals or organizations.
- Whaling: Targeting high-profile individuals like executives.

2. Malware
- Description: Malicious software designed to infiltrate and damage systems or steal data.
- Types:
- Viruses: Attach themselves to legitimate software.
- Worms: Self-replicating malware that spreads through networks.
- Trojan Horses: Disguised as legitimate software but perform harmful actions.
- Ransomware: Encrypts files and demands payment to restore access.

 3. SQL Injection
- Description: A technique where attackers insert malicious SQL queries into input fields to manipulate databases and retrieve sensitive information.
- Impact: Can lead to data breaches and unauthorized access to databases.

4. Cross-Site Scripting (XSS)
- Description: An attack where malicious scripts are injected into trusted websites, allowing attackers to execute scripts in the user's browser.
- Impact: Can steal cookies, sessions, or login credentials.

5. Brute Force Attacks
- Description: Attempting to gain access by systematically trying all possible passwords until the correct one is found.
- Tools: Automated software can speed up this process significantly.

6. Credential Stuffing
- Description: Using leaked usernames and passwords from one breach to gain unauthorized access to accounts on different sites, exploiting users who reuse passwords.

7. Man-in-the-Middle (MitM) Attacks
- Description: An attack where the hacker intercepts communication between two parties, often to steal information.
- Common Methods: 
- Packet Sniffing: Capturing data as it travels across networks.
- SSL Stripping: Redirecting users from secure HTTPS sites to insecure HTTP ones.

8. Distributed Denial-of-Service (DDoS) Attacks
- Description: Overwhelming a target website or service with traffic from multiple sources, causing it to become inaccessible.
- Impact: Can lead to service disruptions and financial losses.

9. Social Engineering
- Description: Manipulating individuals into divulging confidential information or performing actions that compromise their security.
- Common Techniques:
- Pretexting: Creating a fabricated scenario to obtain information.
- Baiting: Offering something enticing to lure victims into exposing sensitive data.

10. Exploiting Unpatched Vulnerabilities
- Description: Taking advantage of known security flaws in software that have not been patched.
- Common Scenarios: Using public exploit databases to find and exploit vulnerabilities in hardware and software.
11. Insider Threats
- Description: Employees or individuals with legitimate access to systems abusing their privileges for malicious purposes.
- Impact: Can lead to data breaches, sabotage, and theft of intellectual property.

12. Session Hijacking
- Description: Taking over a user session by stealing session cookies, allowing an attacker to impersonate the user.

These hacking techniques can be employed individually or in combination, making them particularly dangerous. Organizations must remain vigilant and implement robust cybersecurity practices to protect against these threats.

Based on a discussion between Ruwan Weerakoon and Luke Stephens, a renowned cybersecurity expert and ethical hacker in the United States.

---------------------------
by     (2026-04-23 22:48:20)

We are unable to continue LeN without your kind donation.

Leave a Reply

  0 discussion on this news

News Categories

    Corruption

    Defence News

    Economy

    Ethnic Issue in Sri Lanka

    Features

    Fine Art

    General News

    Media Suppression

    more

Links