Sending an e-mail that, when the recipient opens the message or clicks on the attachment, unleashes a virus that infiltrates and “spoofs†the recipient's e-mail address, allowing a spammer to actually use that computer to send more spam.
A hacking technique that involves taking over an existing TCP connection - normally associated with a Telnet terminal session. The attacker can pretend to be the originator of the connection and have access to whatever resources have been made available to the connection.
Attack in which the attacker takes over a live connection between two entities so that the attacker can masquerade as one of the entities.
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users
Hijacking is an attack whereby an active, established session is intercepted by an attacker who wants to abuse your session. Hijacking can occur both via the Internet as well as locally, i.e. if a user leaves a computer unprotected making it possible for a spammer to pretend his mails are coming from someone else. See also Spoofing.
Hijackers (or browser hijackers) often masquerade as a helpful browser toolbar. They alter browser settings or change the default home page to point to some other site.
An attack whereby an active, established, session is intercepted and used by the attacker. Hijacking can occur locally if, for example, a legitimate user leaves a computer unprotected. Remote hijacking can occur via the Internet.
An attack in which an active, established, session is intercepted, captured and illegally used by the attacker.
The act of relaying spam through a third-party system without permission. Spammers will often relay spam through third-party systems in order to hide the point of origin (effectively laundering the headers.) This is done to trick users into reading messages they would otherwise delete, to evade automated spam-filtering software, and to make it difficult to complain about spam. Hijacking can be harmful to the third-party system in several ways. First, it is theft of service. Second, it is a drain on resources -- a large flood of spam can crash a small server, creating a denial of service attack. Third, it can cause bounces and complaints to be directed to the innocent third party. Fourth, it damages the third party's good name when spam recipients think that the spam came from them.
(Context: computer security) A specialized type of attack in which a live connection between to systems is seized by the attacker and used for his own purposes.
Hijacking is een aanval waarbij een actieve instellings sessie wordt onderschept door iemand die misbruik wil maken van uw sessie. Hijacking kan zowel voorkomen via Internet als lokaal, bijvoorbeeld wanneer een gebruiker zijn computer ombeschermt achterlaat, is het mogelijk voor een spammer om mails te verzenden met zijn account. Kijk ook bij Spoofing.