Member-only story
Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some network attack methods and strategies that hackers might use so you can be aware of them.
Bluejacking
Bluejacking occurs when unauthorized messages or data is sent through Bluetooth technology to a victim’s device. Typically sends a vCard that contains a message in the name field to another Bluetooth device via the OBjectEXchange(OBEX) protocol.
Bluesnarfing
Bluesnarfing occurs when an attacker gains unauthorized access to data on a victims device via Bluetooth connection. Data pulled off could include contacts, pictures, and messages. More sensitive information such as emails and personally identifiable information(PII) can also be stolen through bluesnarfing.
Rogue Access Points
Rogue access points are unauthorized points that were installed without the network owners permission or knowledge. This can be installed for attackers to perform jamming, interference, or man in the middle type of attacks. Rogue access points can also be used to steal and intercept data.