In this section, we will look at attacks where a hacker hijacks either a device, cookie, or piece of software. Let's look at these in turn:
- Bluejacking: Bluejacking is where an attacker takes control of a Bluetooth device such as a phone. They are then able to make phone calls and send text messages.
- Bluesnarfing: Once again, an attacker hijacks a Bluetooth phone, but in this scenario, they extract contact details and any sensitive information.
Input Validation could prevent SQL Injection, Buffer Overflow, and Integer Overflow attacks.
- Session Hijacking: When you visit a website, your desktop can store your browsing information in a file called a cookie. This is a security risk as it can be used to identify you. For example, the second time you visit a website, it may say Good Morning, Mr Smith at the top. If someone copies your cookie and places...