{"id":2633,"date":"2015-12-04T03:12:29","date_gmt":"2015-12-04T03:12:29","guid":{"rendered":"http:\/\/blog.jaringanhosting.com\/?p=2633"},"modified":"2015-12-04T03:12:29","modified_gmt":"2015-12-04T03:12:29","slug":"wordpress-hosting-indonesia-3-tipe-kejahatan-para-hacker","status":"publish","type":"post","link":"https:\/\/blog.jaringanhosting.com\/index.php\/wordpress-hosting-indonesia-3-tipe-kejahatan-para-hacker\/","title":{"rendered":"WordPress Hosting Indonesia- 3 Tipe Kejahatan Para Hacker"},"content":{"rendered":"<p><a href=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/hacker-banned-from-internet-623x410.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-2634 aligncenter\" src=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/hacker-banned-from-internet-623x410.jpg\" alt=\"hacker-banned-from-internet-623x410\" width=\"623\" height=\"410\" srcset=\"https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/hacker-banned-from-internet-623x410.jpg 623w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/hacker-banned-from-internet-623x410-300x197.jpg 300w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/a>WordPress Hosting Indonesia | Sebanyak 74% pemilik website pernah mengalami hack . Hal umum ini cukup meresahkan hampir seluruh pebisnis online. Karena sebanyak 74% responden menyatakan pernah mengalami hack dan loading website yang lambat. \u00a0Masih ingat kasus beberapa bank yang dihack? Tengok saja BCA. Menurut Direktur\u00a0 BCA Suwignyo Budiman, setiap hari, sekitar 4.000 hacker berusaha meretas sistem BCA.<\/p>\n<p>Selain itu permasalahan keamanan deface pun tidak dapat dianggap remeh. Faktanya, di Indonesia saja telah terjadi 1100 serangan\/ bulan. Benar-benar angka yang fantastis. Tentu sebagai pemilik website, kita tidak ingin hal ini terjadi pada website kita.<\/p>\n<p><strong>Social engineering<\/strong><\/p>\n<p>Dalam Social engineering\u00a0 hacker menggunakan teknik manpulasi dan \u00a0rekayasa baik membocorkan informasi sensitif secara langsung atau dengan menginstal perangkat lunak berbahaya pada mesin di PC kita secara otomatis.<\/p>\n<p>Ada Beberapa Tipe Para Hacker<\/p>\n<p><a href=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/phishing-attack.png\"><img loading=\"lazy\" class=\"size-full wp-image-2635 aligncenter\" src=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/phishing-attack.png\" alt=\"phishing-attack\" width=\"343\" height=\"282\" srcset=\"https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/phishing-attack.png 343w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/phishing-attack-300x246.png 300w\" sizes=\"(max-width: 343px) 100vw, 343px\" \/><\/a><strong>1. Pishing<\/strong>, \u00a0\u00a0Salah satu yang paling umum dan taktik yang paling terkenal adalah email penipuan berisi link yang bila diklik, link tersebut langsung menginstal malware atau mengarahkan korban ke sebuah website khusus \u00a0yang kemudian digunakan untuk \u00a0memberikan informasi seperti username dan password.<\/p>\n<p><a href=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-2637 aligncenter\" src=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0.jpg\" alt=\"Social Engineering, Baiting, Phishing, Email Hacking, Contact Spamming, Pretexting, Spear Phishing,Vishing, Hunting, Farming NORTON_0\" width=\"500\" height=\"500\" srcset=\"https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0.jpg 500w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0-150x150.jpg 150w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0-300x300.jpg 300w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0-230x230.jpg 230w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Social-Engineering-Baiting-Phishing-Email-Hacking-Contact-Spamming-Pretexting-Spear-PhishingVishing-Hunting-Farming-NORTON_0-365x365.jpg 365w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>2. Baiting<\/strong>, hati-hati terhadap USB Drive yang kita pakai apabila terjangkit virus. Sebab bisa saja virus tersebut bertujuan untuk melihat apa yang ada di USB drive milik kita.<\/p>\n<p><a href=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Computer-Crime.shutterstock.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-2638 aligncenter\" src=\"http:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Computer-Crime.shutterstock.jpg\" alt=\"Computer Crime.shutterstock\" width=\"500\" height=\"375\" srcset=\"https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Computer-Crime.shutterstock.jpg 500w, https:\/\/blog.jaringanhosting.com\/wp-content\/uploads\/2015\/12\/Computer-Crime.shutterstock-300x225.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>3.Pretexting<\/strong>, di mana\u00a0 hacker \u00a0akan meniru seseorang dalam upaya untuk mengelabui staff kita untuk membocorkan informasi sensitive. Misalnya seorang hacker \u00a0dapat menghubungi berpura-pura menjadi seorang manajer meminta reset password pada keamanan system di kantor kita.<\/p>\n<p>Permasalahan keamanan pada bisnis online kita adalah hal yang sangat penting. Sehingga jangan dianggap remeh. 3 Tipe Kejahatan Hacker tersebut hanyalah sebagian dari banyaknya modus kejahatan yang dilakukan. Mudah-mudahan kita lebih berwaspada dan lebih menjaga keamanan system informasi pada bisnis online kita.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WordPress Hosting Indonesia | Sebanyak 74% pemilik website pernah mengalami hack . Hal umum ini cukup meresahkan hampir seluruh pebisnis online. Karena sebanyak 74% responden menyatakan pernah mengalami hack dan loading website yang lambat. \u00a0Masih ingat kasus beberapa bank yang<\/p>\n","protected":false},"author":10337,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[630,4],"tags":[609,610,782,69],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/posts\/2633"}],"collection":[{"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/users\/10337"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/comments?post=2633"}],"version-history":[{"count":0,"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/posts\/2633\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/media?parent=2633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/categories?post=2633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.jaringanhosting.com\/index.php\/wp-json\/wp\/v2\/tags?post=2633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}