Types of Wireless and Mobile Device Attacks
Hey guyz welcome to an another important post which is quite interesting
Wireless and Mobile device attacks have become a very common security issue when it comes
to networks and mobile. This is because such attacks can really get a lot of
information that is being sent across a network and use it to commit
some crimes in other networks. Every wireless network and mobile devices is very vulnerable
to such kinds of attacks and it is therefore very important that all
the necessary security measures are taken so as to prevent the mess that
can be caused by such attacks. These attacks are normally carried out
to target information that is being shared through the networks.By sending anonymous messages to the target or by sending malicious links through the SMS the hacker can hack the information from the mobile. It is
therefore very important to know of such attacks so that one is in a
position to identify it in case it happens. Some of the common network and mobile
attacks have been outlined below.
-
SMiShing :
Smishing become common now as smartphones are widely used. SMiShing uses Short Message Service (SMS) to send fraud text messages or links. The criminals cheat the user by calling. Victims may provide sensitive information such as credit card information, account information, etc. Accessing a website might result in the user unknowingly downloading malware that infects the device.
-
War driving :
War driving is a way used by attackers to find access points wherever they can be. With the availability of free Wi-Fi connection, they can drive around and obtain a very huge amount of information over a very short period of time.
-
WEP attack :
Wired Equivalent Privacy (WEP) is a security protocol that attempted to provide a wireless local area network with the same level of security as a wired LAN. Since physical security steps help to protect a wired LAN, WEP attempts to provide similar protection for data transmitted over WLAN with encryption.
WEP uses a key for encryption. There is no provision for key management with Wired Equivalent Privacy, so the number of people sharing the key will continually grow. Since everyone is using the same key, the criminal has access to a large amount of traffic for analytic attacks.
- WPA attack :
Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols to replace WEP. WPA2 does not have the same encryption problems because an attacker cannot recover the key by noticing traffic. WPA2 is susceptible to attack because cyber criminals can analyze the packets going between the access point and an authorized user.
-
Bluejacking :
Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.
-
Replay attacks :
In Replay attack an attacker spies on information being sent between a sender and a receiver. Once the attacker has spied on the information, he or she can intercept it and retransmit it again thus leading to some delay in data transmission. It is also known as playback attack.
-
Bluesnarfing :
Bluesnarfing is far much more malicious than Bluejacking since it involves using one's Bluetooth to steal information. This is where a bluetooth-enabled device is able to use the vulnerability on the bluetooth network to be able to get into a mobile device to steal information such as contacts and images. This is a vulnerability that exposes the weakness and vulnerability with the bluetooth network.
-
RF Jamming :
Wireless signals are susceptible to electromagnetic interference and radio-frequency interference. Radio frequency (RF) jamming distorts the transmission of a satellite station so that the signal does not reach the receiving station.
I hope you have enjoyed the post.Thanks for reading the post and please do share the post and make your valuable comments.
Comments
Post a Comment