Here are 3 ways your organization - and probably even your personal computer - is likely to have been hacked:
We've all tried to load Firefox (or Safari, or um, if you're still using it...Internet Explorer), and seen the message: "The Connection has timed out, the server is taking too long to respond."
It's a pain. But an innocuous enough setback, right? Wrong. If your bank gets hit with this, it could be the first sign of a Denial of Service attack, which according to experts, isn't technically a "hack," since it can be done without breaking into any system. But it's still pretty lethal.
DoS attacks usually flood a website's with requests, making them completely unresponsive. If you work for a big bank, you may be subjected to botnets, where infected computers all send out requests at the same time. CNN points out, "There's not much that Web companies can do to prevent that kind of attack except to get more servers."
"DoS attacks are very difficult to defend against," Paul Asadoorian, CEO of security consultancy PaulDotCom Enterprises, said in a story on CNN.com. "But attackers are not stealing any information when they do a DoS."
Other ways you might have been hacked include SQL attacks, where hackers get a targeted website to show them what the site's vulnerabilities are.
"Sometimes hackers perform "Google hacks" to use the search engine to find cached examples of error messages on pages. Other times, they enter odd terms into a website's search box to see if the site spits back error messages from its SQL database. Those error messages can tell hackers a lot about the site -- often, enough to exploit the found vulnerability by injecting malicious code into the database. That's known as a SQL injection.
SQL injections can be used to get a site to spit back its database contents, such as lists of usernames and passwords. They can also be used to infect visitors' computers with malware. About 14% of all hacks last year involved SQL injections, according to Verizon's 2011 Data Breach Investigations Report."
One of the spookiest attacks is spear phishing, which targets a specific victim and makes you believe an email is coming from a trusted source like a friend or your boss. According to CNN.com, "spear phishers are often agents of foreign governments that do reconnaissance work on their victims to figure out what will make them believe an e-mail is coming from a trusted source."
Watch this space for tips on how to prevent these attacks.Melanie Rodier has worked as a print and broadcast journalist for over 10 years, covering business and finance, general news, and film trade news. Prior to joining Wall Street & Technology in April 2007, Melanie lived in Paris, where she worked for the International Herald ... View Full Bio