Categories: Blog

Sniffing

[vc_row][vc_column][vc_column_text]

What is sniffing?

Sniffing in the computer-technology sense refers to the act of eavesdropping on network traffic, perhaps between a computer and a website or between two computers.

When used for malicious purposes, sniffing can result in private information being stolen.

How does it work and what’s the risk?

Sniffing allows a user to obtain data while it is being transmitted through a network.

It’s often used for legitimate purposes to help with diagnosing issues that might exist on a network, but it’s also used by hackers to gain control of sensitive data like passwords or usernames.

Passwords are typically the most stolen piece of information in online hacks.

With sniffing, victims are usually unaware that their password characters are being sent across a network in a form that can easily be seen by a sniffer.

Thieves could also read emails sent between two machines, or look at database records that contain sensitive information about a person or corporation.

In some instances, information can be used to start an attack against data that exists in another computer system.

Your bank account numbers or other similar information could also be stolen; unencrypted data is most at risk of being stolen during a sniffer’s attack.

During financial transactions online, sniffers could be able to see account numbers which could then be used to take money out of an account or to pay for something online.

How to protect against sniffing

First and foremost, keep confidential information such as usernames and passwords or bank account information encrypted when it is being sent throughout the Internet.

Programs exist that can also encrypt emails.

If you use File Transfer Protocol (FTP) to transfer sensitive files of any kind, consider using Secure File Transfer Protocol (SFTP) instead.

SFTP encrypts the connection to help protect the information being shared.

If you use a network protocol to remotely access and manage a device, consider using Secure Shell (SSH), which uses encryption and keeps the information being sent out of the hands of sniffers.

With an SSH client, you can connect to a server remotely[/vc_column_text][/vc_column][/vc_row]

Areyo Dadar

Share
Published by
Areyo Dadar

Recent Posts

New Comparison Chart

fhjfgn

2 years ago

LifeLock Reviews

[vc_row][vc_column][vc_column_text] [simple_tooltip content='** Credit card required at enrollment. If you`re not completely satisfied within your…

2 years ago

Identity Guard Reviews

[vc_row][vc_column][vc_single_image image="8699" img_size="full"][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text="What We Love About Identity Guard" font_container="tag:h2|font_size:30px|text_align:left|color:%23446084" google_fonts="font_family:Coda%3Aregular%2C800|font_style:400%20regular%3A400%3Anormal"][vc_column_text] $2000 emergency cash if…

2 years ago

Dumpster Diving

[vc_row][vc_column][vc_column_text] Dumpster Diving Did you ever wonder what kinds of people dig through dumpsters in…

2 years ago

Credit Freeze: The Definitive How to Guide (50 state interactive map)

[vc_row][vc_column][vc_column_text] If you’re worried about identity theft and want to stop anyone trying to gain…

2 years ago

Why Is It So Hard To Catch Identity Thieves?

  What if I were to tell you that 15 million Americans fall victim to…

2 years ago