Member-only story

Cyber Security: Network Attacks

Jesse L
3 min readOct 5, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some network attack methods and strategies that hackers might use so you can be aware of them.

Bluejacking

Bluejacking occurs when unauthorized messages or data is sent through Bluetooth technology to a victim’s device. Typically sends a vCard that contains a message in the name field to another Bluetooth device via the OBjectEXchange(OBEX) protocol.

Bluesnarfing

Bluesnarfing occurs when an attacker gains unauthorized access to data on a victims device via Bluetooth connection. Data pulled off could include contacts, pictures, and messages. More sensitive information such as emails and personally identifiable information(PII) can also be stolen through bluesnarfing.

Rogue Access Points

Rogue access points are unauthorized points that were installed without the network owners permission or knowledge. This can be installed for attackers to perform jamming, interference, or man in the middle type of attacks. Rogue access points can also be used to steal and intercept data.

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

No responses yet