Anatomy of a basic attack…
I was hoping to find a way that the average reader would understand about the process that ensues when a target is identified and eventually pwned. ‘Pwned’ is a term whose etymology is attributed to a typo because the keys ‘o’ and ‘p’ are so close to each other on a qwerty style keyboard. Its history dating back to the early 21rst century when first person shooters were popular video games. It is meant to indicate the ability to conquer and gain ownership.
Today ownership isn’t just in the video game area – it is being waged in the computer world to control information, bandwidth and overall control of a computer and it’s network. If you loose control of your electronic devices you may or may not ever know it. Individuals, competitors or even nation states have been doing this for many years and everyone is a potential victim.
If you buy electronics and want to be hooked up to the internet you may want to read about the methods that can be used to gain access to your computers. Whether it is for fun, to prove a point or as a launching point to another site anyone can suffer from an orchestrated attack.
I recently reviewed a website who managed to sum up the essence of an attack. You can read more about the process from his link (here) but please pay heed – this could happen to you if you don’t take steps to prevent it from happening. Contact us for a consultation and to learn more.