Archives 2023

Warning: The ‘Unsubscribe’ Trap in Suspicious Emails & How to Avoid It

Unsubscribe Button Photo

Phishing: What Happens When You Click ‘Unsubscribe’

When you click “unsubscribe” in a legitimate email, you intend to stop receiving further communications from the sender. However, if you’re dealing with a phishing email, clicking “unsubscribe” can lead to several unfavorable outcomes, potentially making things worse.

  • Verification of Active Email Address: One of the primary objectives of phishing campaigns is to gather valid, active email addresses. By clicking on the “unsubscribe” link, you tell the attacker that your email address is active and monitored, making it a more valuable target for future scams or spam.
  • Malware Infection: The link might lead to a malicious website that downloads and installs malware onto your device. This malware could be anything from ransomware (which encrypts your files and demands payment for their release) to spyware (which monitors your activities and steals sensitive information).
  • Credential Harvesting: The link could redirect you to a counterfeit webpage that looks like a legitimate site you use (e.g., banking, email, or social media). The goal is to trick you into entering your login credentials, which the attackers can exploit.
  • Drive-By Download Attacks: Some malicious websites are designed to exploit vulnerabilities in your web browser or its plugins. Just by visiting the site, without any further action on your part, malware might be downloaded and installed on your device.
  • Tracking Pixels: By clicking the link, the phisher might also be able to retrieve certain information about your device or location, enhancing their profile of you for further attacks.
  • Further Spam: By interacting with the phishing email, the attackers might categorize you as an “engaged” user. This could result in an increased volume of phishing emails or spam.

Why Clicking “Unsubscribe” Isn’t Helping

Legitimacy Misunderstanding: Many people associate “unsubscribe” links with legitimate emails. Attackers exploit this trust by including such links in phishing emails.

  • False Sense of Security: Clicking “unsubscribe” might lead you to believe you’ve resolved the issue and won’t receive further malicious emails from that sender. In reality, you’ve just signaled your engagement to the attacker.
  • No Regulatory Backing: Phishers operate outside the law, unlike legitimate marketing emails regulated by laws (like the CAN-SPAM Act in the US) that require honoring unsubscribe requests. They are not obligated to stop sending you emails because you clicked “unsubscribe.”

Phishing Protection: How To Protect Yourself

  • Avoid Interacting: If you suspect an email might be a phishing attempt, avoid clicking any links, downloading attachments, or interacting with the email in any way.
  • Verify Directly: If unsure about an email’s legitimacy, contact the company or sender directly using a verified phone number or email address, not any contact details from the suspicious email.
  • Update & Protect: Ensure your operating system, web browsers, and security software are regularly updated to defend against known vulnerabilities.
  • Educate Yourself: Familiarize yourself with common signs of phishing emails, such as generic greetings, poor grammar, urgent or threatening language, and mismatched URLs.

You may be interested in this article and guide on stopping the attack cycle from CISA. Or, our blog post on avoiding the top ten social media scams.

Cyber Criminals Exploit QR Codes in Sophisticated Phishing Attacks

The use of QR codes has skyrocketed, especially with the development of mobile technologies. Our ability to browse the restaurant’s menu and websites, authenticate transactions, and even make payments is made possible by them. They provide a practical link between the real and digital worlds. However, the dark side of the internet has started using QR codes for evil purposes, particularly in phishing and cyberattacks, just like with any other technology.

The Use of QR Codes in Phishing Attacks

The top three business verticals for QR code use are retail and shopping, restaurants & cafes, and healthcare. Attackers substitute phony QR codes that point to phishing websites for real QR codes that might be on fliers, posters, and signs. The users of these websites may then be tricked into installing malware or disclosing personal information.

  • Malicious QR codes for mobile devices might direct users to download risky software or programs that compromise their devices.
  • Deceptive Promotions: Attackers entice users to scan a QR code by promising false discounts or promotions, which starts a destructive operation.

QR Code Safety Guidelines

  1. Verify Before Scanning: Look for any signs of tampering before scanning a QR code, especially in public areas. Avoid scanning if you’re unsure.
  2. Utilize a Secure QR Code Scanner: Several mobile security programs provide built-in QR code scanners to identify dangerous URLs.
  3. After scanning, always double-check the URL before moving on. Suspicious-looking URLs or typos are common on malicious websites.
  4. Avoid Downloading Files: Use extra caution if the QR code asks you to download a file. Downloading files shouldn’t be done unless the source is known to you.
  5. Update the operating system and apps on your device frequently. Routine updates frequently include security fixes that stop malware and phishing efforts.
  6. Use Two-Factor Authentication (2FA): Having 2FA activated can add extra security, even if attackers get some of your information.

The key is to inform and spread awareness. Let your friends and relatives know cyber-criminals are planting fake and dangerous QR codes around. It takes everyone to be on the lookout.

In this digital age, QR codes provide unmatched convenience, but it’s important to use caution when using them. We can enjoy and utilize the advantages of QR codes without being a target of cyber dangers by being aware and using safe practices. Always keep in mind: don’t scan if you’re unsure!

You may enjoy reading about the history of the QR Code; see this article. Our blog post on social media scams may also be helpful.

Passkeys, the authentication wave of the future?

A passkey is a new way to log in to online accounts, services, and apps designed to be faster, easier to use, and more secure than passwords. Passkeys are based on public-key cryptography, the same technology used to secure HTTPS connections and online payments. Ready to go passwordless?

How to Use a Passkey

To use a passkey, you first need to create one. This can be done on your device, such as your phone or computer. Once you have created a passkey, you can log in to any website or app supporting passkeys.

To log in, you must select the passkey for the website or app you want to log in to and then authenticate with your device using a biometric sensor (such as your fingerprint or face) or a PIN.

Benefits of Using a Passkey

Passkeys offer several benefits over passwords, including:

  • Security: Passkeys are more secure than passwords because they are more difficult to hack or steal. Passkeys are also less susceptible to phishing attacks.
  • Convenience: Passkeys are easier to use than passwords because you don’t have to remember or type them in. You can authenticate with your device using a biometric sensor or PIN.
  • Privacy: Passkeys are more private than passwords because they don’t require you to share any personal information with the website or app you’re logging in to.

Future of Passkeys

Passkeys are a new technology that is quickly gaining adoption from major tech companies such as Apple, Google, and Microsoft. Passkeys are expected to become the standard way to log in to online accounts, services, and apps soon.

Benefits of using passkeys for future use

Passkeys offer several benefits for future use, including:

  • Reduced risk of fraud: Passkeys can help to reduce the risk of fraud, such as account takeovers and phishing attacks.
  • Improved user experience: Passkeys can improve the user experience by making it easier and faster to log in to online accounts, services, and apps.
  • Increased security: Passkeys can help improve the internet’s overall security by making it more difficult for attackers to access user accounts.

Overall, passkeys are a promising new technology that has the potential to revolutionize the way we log in to online accounts, services, and apps. Are you ready to go passwordless?

For additional info, read this blog post by Google. You may also be interested in our article about the padlock and HTTPs for secure sites.

How to keep your WordPress site from being hacked – WordPress security best practices

WordPress is a popular website content creator and platform. Still, it takes work to make it secure, partly by keeping it updated and applying security tools like Wordfence. If properly maintained, it can avoid becoming vulnerable to various threats. Here’s a list of dangers associated with outdated WordPress sites and WordPress security best practices to remediate them.

Dangers of Outdated WordPress Sites:

  • Vulnerabilities in Core Software:
    • Outdated WordPress core files may contain known vulnerabilities that hackers can exploit.
  • Plugin & Theme Vulnerabilities:
    • Older plugins and themes can have unpatched vulnerabilities.
  • Malware Infections:
    • Outdated sites can be more easily compromised, leading to malware infections that can deface your site, steal data, or distribute malware to visitors.
  • DDoS Attacks:
    • Vulnerabilities can be exploited to turn your site into a bot in a Distributed Denial-of-Service (DDoS) attack.
  • SEO Spam:
    • Hackers can inject spammy content or links, harming your SEO ranking.
  • Data Theft:
    • Personal data, user information, and other sensitive data can be accessed and stolen.
  • Phishing:
    • Your site can be used to host phishing pages without your knowledge.
  • Loss of Reputation:
    • If users or customers discover your site is compromised, it can severely damage your brand’s reputation.
  • Financial Costs:
    • Cleaning a hacked website can be expensive, especially if you have to hire experts.
  • Data Loss:
    • Critical data can be deleted or held for ransom.

Strategies to Keep WordPress Sites Safe:

  • Regular Updates:
    • Always update the WordPress core, plugins, and themes to the latest versions. This is a key WordPress security best practice.
  • Use Trusted Plugins and Themes:
    • Only install plugins and themes from reputable sources. Check reviews, update frequency, and remove the ones that are end-of-life or no longer supported by the developer or publisher.
  • Implement Strong Authentication:
    • Use strong, unique passwords and always enable MFA (multi-factor authentication or 2FA (two-factor authentication) for additional security.
  • Daily Backups:
    • Use plugins or services that provide daily backups of your site. Ensure backups are stored off-site and are easily restorable.
  • Security Plugins:
    • For additional protection, utilize security plugins like Wordfence, Sucuri Security, or iThemes Security, preferably the pro version that applies malware signatures and updates immediately versus once a month (i.e., Wordfence). This is a critical WordPress security best practice.
  • Limit User Access:
    • Assign appropriate roles and permissions. Not everyone needs administrative access.
  • Web Application Firewall (WAF):
    • Use a cloud-based WAF like Cloudflare or Sucuri to filter malicious traffic.
  • Secure Hosting:
    • Choose a reputable web host that emphasizes security and provides isolated site environments.
  • SSL Encryption:
    • Implement an SSL certificate to encrypt data between the server and browser.
  • Regular Security Audits:
    • Conduct periodic security scans and assessments.
  • Disable Directory Listing:
    • Prevent hackers from viewing the contents of directories.
  • Implement Logging:
    • Keep an audit log of site activity to monitor suspicious behavior.
  • Disable XML-RPC:
    • If not needed, disable XML-RPC to prevent DDoS attacks and unauthorized access.
  • Implement CAPTCHAs:
    • Use CAPTCHAs to prevent bots from submitting forms or accessing login pages.
  • Stay Informed:
    • Join WordPress forums, communities, or news portals to stay updated on the latest threats and security practices.

By adhering to these WordPress security best practices and maintaining a proactive approach to web and application security, you can significantly reduce the risk of your WordPress site being compromised.

You may also be interested in how to tell if you’re computer has been compromised and how to recover from a social media scam. Learn more about Wordfence for WordPress Security.

Top 10 Social Engineering Attacks and How to Avoid Them

The Human Aspect of Cybersecurity: Social Engineering

Despite the constant advancement of technology protections, human psychology continues to be a constant and susceptible target in the field of cybersecurity. This weakness is exploited by social engineering, which uses human behavior manipulation rather than digital code cracking to gain unauthorized access to systems, data, or physical areas. Social engineers expertly trick people into disclosing private information or taking particular activities using strategies that prey on emotions, trust, and curiosity. Understanding the subtleties of social engineering is increasingly important as the digital era develops, underscoring the crucial significance of awareness and education in protecting people and businesses. Here are our Top 10 Social Engineering Attacks.

Top 10 Social Engineering Attacks

Phishing:

  • Description: Attackers send fraudulent emails appearing to be from legitimate sources to get individuals to reveal sensitive information.
  • Avoidance: Verify email addresses, especially for unexpected messages. Don’t click on suspicious links. Use email filters.

Spear Phishing:

  • Description: A more targeted version of phishing where specific individuals or organizations are attacked.
  • Avoidance: Regularly update and patch systems. Train employees to recognize such attempts.

Vishing (Voice Phishing):

  • Description: Fraudulent phone calls where scammers pretend to be from trusted organizations to gather sensitive data.
  • Avoidance: Don’t give out personal information over the phone unless you initiate the call. Verify unexpected callers by hanging up and calling back through an official number.

Baiting:

  • Description: Attackers lure victims with the promise of goods to steal information or infect systems.
  • Avoidance: Be skeptical of too-good-to-be-true offers. Download software or content only from trusted sources.

Tailgating/Piggybacking:

  • Description: An attacker seeks entry to a restricted area without proper authentication by following someone with authorized access.
  • Avoidance: Ensure physical security measures. Don’t let strangers in without verification.

Pretexting:

  • Description: Attackers fabricate situations to steal victims’ personal information.
  • Avoidance: Be wary of unsolicited communications. Verify identities before sharing any information.

Quizzes and Surveys:

  • Description: Scammers use fun quizzes or surveys to gather personal information.
  • Avoidance: Don’t participate in random online quizzes, especially those asking personal or security questions.

Waterholing:

  • Description: Attackers infect websites frequented by a targeted group.
  • Avoidance: Keep software and browsers updated. Use security software that can detect malicious websites.

Scareware:

  • Description: Fraudulent claims about malware infections to scare users into installing malicious software.
  • Avoidance: Don’t panic when faced with such alerts. Verify through trusted security software.

Honeytrap:

  • Description: Attackers use an individual (real or fake persona) to form a relationship with the target to gather information.
  • Avoidance: Be cautious with strangers online, especially if they’re overly interested in sensitive or work-related topics.

General Prevention Tips:

  1. Regularly educate and train employees about social engineering tactics.
  2. Maintain up-to-date security software.
  3. Encourage skepticism and verification in all communications.
  4. Use multi-factor authentication for accounts.

Conclusion:

While we arm our systems with the newest technology defenses in the ever-expanding digital frontier, it’s critical to remember that the human element still represents the most vulnerable point of entry. The important relationship between psychology and cybersecurity is highlighted by social engineering, which serves as a reminder that not all dangerous threats are coded but rather are intended to persuade. Fostering awareness, alertness, and ongoing education against these deceptive methods becomes prudent and essential as we continue to navigate an interconnected world. After all, information is undoubtedly our best weapon in the fight against social engineering.

You may also find this article and video by the FBI interesting. Also, our article on recovering from a social media scam may be helpful.

How to recover from a social media scam

If you’ve fallen victim to a social media scam, it’s important to take swift and thorough actions to protect your information and prevent further harm. Here’s a detailed guide to reporting and recovering from such an incident:

Social Media Scam

1. Identify the Scam:

  • Common Social Media Scams:
    • Fake giveaways or contests.
    • “See who viewed your profile” scams.
    • Messages from fake profiles or impersonated friends asking for money or personal information.
    • Clickbait links leading to malicious sites.

2. Change Your Passwords:

  • Start with the compromised social media account. Then, change passwords for other important accounts (especially if you reuse passwords, which is not recommended).

3. Check Account Settings:

  • Look for any unauthorized changes. This includes checking linked email addresses, phone numbers, and third-party apps with account access.

4. Enable Two-Factor Authentication (2FA):

  • Enable MFA/2FA on your social media accounts and any other accounts offering this added security layer.

5. Scan for Malware:

  • If you clicked on any suspicious links or downloaded files, scan your device with a reputable antivirus or antimalware software. Preferably, scan with multiple. For example, if you already have Bitdefender installed, scan with Norton Power Eraser, Emsisoft EEK, Malwarebytes, and Eset Online Scanner.

6. Report the Scam to the Social Media Platform:

  • Platforms like Facebook, Instagram, Twitter, and LinkedIn have dedicated reporting mechanisms for scams and fake profiles.
    • For instance, on Facebook, go to the specific profile or page > click on the three dots (…) > choose ‘Find Support or Report Profile’ > follow the prompts.

7. Document Everything:

  • Take screenshots of the scam, including messages or posts.
  • Document any financial losses or unauthorized transactions.

8. Contact Your Bank or Credit Card Company:

  • If you’ve shared financial information or believe your financial accounts have been compromised, notify your bank or credit card company immediately. They can guide you on the next steps, including disputing charges or issuing new cards.

9. Monitor Your Accounts:

  • Keep an eye on financial and online accounts for any unusual activity.

10. Report to Authorities:

  • Depending on the severity, consider filing a report with local law enforcement.
  • In the U.S., you can report online scams to the Federal Trade Commission (FTC) via their website.

11. Educate & Spread Awareness:

  • Inform your friends and followers (without sharing scam links) about the scam to prevent them from falling for it.
  • Educate yourself on common online scams to protect against future threats.

12. Check for Signs of Identity Theft:

  • If personal information was shared, monitor for signs of identity theft. Consider signing up for identity monitoring services.
  • Consider placing a fraud alert or credit freeze on your credit reports for U.S. residents.

13. Review Privacy Settings:

  • Review the privacy settings on your social media accounts to ensure you’re only sharing information with trusted individuals or networks.

Remember: Scammers constantly evolve their tactics, so always be cautious. Never share personal or financial information unless you know an entity’s legitimacy. Regularly educating yourself about the latest scam trends can help you stay one step ahead and help you recover from a social media scam. You may also like our article on recognizing when your computer has a virus; read it HERE.

For further info from Tripwire, click HERE, and from the FTC, click HERE.

How to know if you have a malware infection?

Malware poses a threat to all of us. It’s important to note, though, that malware must be executed, or to put it another way, run, to carry out its destructive objective, whether to steal your information or harm your system. This straightforward reality is a double-edged sword since it allows malware to cause harm and opens up a window for its detection and elimination.

Malware Cannot Always Remain Hidden, Not Even In Memory.

In contrast to writing to disk, several sophisticated malware strains are built to run solely in system memory. This “in-memory” method is frequently employed to get around typical antivirus and antimalware programs that examine disk data. Malware isn’t necessarily invisible merely because it’s not present on the disk.

Since the virus must be executed to carry out its intended job, it will suck up system resources, leave a trail in system logs, or trigger observable network activity. These dangers can be discovered with the aid of instruments like memory forensics.

Symptoms of a Malware Infection

Even while malware frequently strives to remain undetectable, it frequently leaves some traces behind. The following are some warning indicators that your computer may be infected:

  1. Sluggish Performance: Malware can occasionally be blamed for a sudden slowdown in your computer’s performance by utilizing system resources.
  2. Unwanted Pop-ups and Advertising: If you see pop-ups and advertising that you didn’t previously see, especially those that urge you to click on dubious links or advertise antivirus software, it could be adware or another type of malware.
  3. Unusual Network Activity: Data use spikes or mysterious network traffic may indicate that malware sends or receives data to or from your device.
  4. Security software turned off: In an effort to defend themselves, certain malware can turn off your firewall or antivirus program.
  5. Unusual Files and Apps: If you discover new files or applications that you didn’t install, this may be a symptom of an infection.
  6. Frequent system crashes or the “blue screen of death” can be a sign, albeit they are not just caused by malware.

Getting Rid of a Malware Infection

Here’s what to do if you believe you have a malware infection:

  1. Your machine should start up in Safe Mode. This will prevent most viruses from starting by starting your computer with a minimal set of drivers and services.
  • Update and Scan: Run a comprehensive system scan and update your antivirus and antimalware software.
  • Use Specialized Tools: Some malware is able to bypass traditional antivirus programs. Specialized malware eradication programs can be useful in these situations.
  • Backup and Clean Install: You might need to perform a backup of your important information and a clean installation of your operating system if the infection is serious.
  • Change Passwords: After eliminating spyware, particularly that intended to steal personal information, change all of your passwords.
  • Stay Current: Update your operating system and software frequently. Numerous malware variants take advantage of well-known flaws in out-of-date software.

Malware is a serious threat, but the fact that it must be allowed to function (run) gives us a considerable edge in terms of identification and mitigation. Always be on guard, keep your software up-to-date, and be wary of what you download and open. Your safety online depends on it.

You may find our article on using Netstat to detect rogue connections interesting, read it HERE.
Additionally, here’s what Microsoft says on removing malware.

How to use netstat to identify rogue connections

Netstat is a command-line utility available on Windows operating systems that allows you to display information about network connections, routing tables, interface statistics, masquerade connections, etc. You can use netstat -ano to see active network connections and their associated process IDs (PIDs), which can help you identify potential rogue connections to your machine.

Here’s a step-by-step tutorial on how to use netstat and the most common switches (-ano).

Step 1: Open Command Prompt

  • Press Win + R to open the Run dialog.
  • Type “cmd” and press Enter to open the Command Prompt.

Step 2: Run netstat -ano

In the Command Prompt window, type the following command and press Enter:

netstat -ano

This command will display a list of active network connections and associated PIDs.

Step 3: Analyze the Output

The output of netstat -ano will have several columns:

  • Proto: Indicates the protocol used (e.g., TCP, UDP).
  • Local Address: Shows the local IP address and port.
  • Foreign Address: Displays the remote IP address and port.
  • State: Shows the state of the connection (e.g., ESTABLISHED, TIME_WAIT).
  • PID: Indicates the Process ID associated with the connection.

Here’s how to analyze the output:

  • Look for any unfamiliar or suspicious IP addresses in the “Foreign Address” column. These could potentially be rogue connections.
  • Check the “State” column to see if any connections are in unusual states (e.g., TIME_WAIT for a long time).
  • Identify the PID associated with each connection in the “PID” column. You can cross-reference this PID with the Task Manager to determine which process is responsible for the connection.

Step 4: Investigate Suspicious Connections

If you find any connections that you suspect are rogue or unwanted, take the following actions:

  1. Identify the Process: Use the PID from the “PID” column to locate the associated process in Task Manager. Right-click the Taskbar, select “Task Manager,” go to the “Details” tab, and find the process with the matching PID.
  2. Research the Process: If the process is unfamiliar or suspicious, research it online to determine if it’s legitimate or potential malware. Be cautious before terminating any processes.
  3. Terminate Suspicious Processes: If you’re certain that a process is malicious or unwanted, you can end the process in Task Manager by right-clicking the process and selecting “End Task.” However, exercise caution, as terminating critical system processes can cause system instability; know what you’re doing.
  4. Firewall and Antivirus: Ensure that you have a firewall and antivirus software installed and updated. They can help detect and block unwanted network connections and malware.

For more switches and details, visit Microsoft’s documentation on Netstat here. You may also like our article on detecting malware on your machine.

A Closer Look at HTTPS and the Padlock Icon for Websites. What do they mean?

“HyperText Transfer Protocol Secure” is what HTTPS stands for. It is the standard protocol for sending and getting data over the web, but it adds an extra layer of security. This extra protection is shown by the “S” in HTTPS.

When you use HTTPS to connect to a website, the data you send and receive is protected. This means that even if someone gets a hold of the data, they won’t be able to figure out what it says because it has been turned into a code. The data is encrypted, so only the website and your browser have the “keys” to decode and read it.

The Padlock Icon: When you visit a website, you might see a small padlock icon in the address bar, usually next to the website’s URL. This padlock lets you know that the website uses HTTPS and is safe for entering your data; it has an SSL/TLS certificate. The website has a confirmed layer of protection that ensures the information your browser sends to the website stays private and safe.

When HTTPS and the padlock are used together, users know that their data is protected and that the website they’re using has been verified as a safe place that cares about protecting user data. This is especially important for websites where private information is shared, like credit card numbers or personal information.

What Actually Happens When You Connect to the Internet?

In this hyper-connected digital age, the internet’s complexity is sometimes hidden by its ease of use. Clicking on a link or entering in a URL opens up a world of knowledge, entertainment, and social interaction, hiding the complex protocols, servers, and data exchanges behind the scenes. Instantaneous global connectedness, once a dream, is now part of our daily lives, so we forget its impact. Human creativity has made such a powerful instrument as ordinary and intuitive as flipping a light switch, but we must occasionally pause and appreciate the internet’s technology and teamwork.

Accessing the internet from any device involves multiple intricate steps. Here’s a granular breakdown of what typically happens:

  1. Input URL & Initial Check: You input a URL (e.g., www.cybertipsguide.com) into a web browser. The browser checks its cache to see if it already has the IP address for the URL.
  2. Hosts File: If the IP address isn’t in the browser’s cache, the computer checks the local “hosts” file for any static entries that match the domain name.
  3. DNS Query: If the “hosts” file doesn’t contain the domain’s IP address, the system queries a DNS (Domain Name System). First, the computer contacts a local recursive or caching DNS server, often provided by your ISP. If this server doesn’t have the IP address cached from previous requests, it will proceed with the DNS resolution process. DNS Resolution Process: Root Name Server: The DNS resolver queries a root name server, which responds with the address of a Top-Level Domain (TLD) server. TLD Name Server: The resolver then asks the TLD server (e.g., .com) about the specific domain. Domain’s Name Server: The TLD server responds with the IP address of the domain’s name server. The resolver then queries this server.
  4. Obtain IP Address: The domain’s name server finally provides the IP address for the domain, which gets sent back to the computer.
  5. ARP (Address Resolution Protocol): Before the computer can send data packets to the web server, it needs to know the physical MAC address of the next device in the data path, usually your router. If your computer doesn’t already have the router’s MAC address cached, it uses ARP to obtain it. The computer broadcasts an ARP request onto the local network, asking, “Who has this IP address?” The device with that IP (usually the router) responds with its MAC address.
  6. Establish Connection: With the web server’s IP address and the router’s MAC address known, the computer initiates a connection using the TCP/IP protocol. This involves a TCP “three-way handshake” to establish a reliable connection: The computer sends a SYN packet. The web server replies with a SYN-ACK packet. The computer responds back with an ACK packet.
  7. Data Transfer: Once the connection is established, the browser sends an HTTP request to the web server, asking for the desired webpage. The web server processes the request and sends back the requested data, usually as an HTTP response containing web content like HTML, CSS, and JavaScript.
  8. Render the Page: The browser receives the data and processes it. It will render the page, execute scripts, apply styles, and display content.
  9. Close Connection: After the data transfer is complete and the webpage rendered, the computer sends a message to terminate the TCP connection with the server. This involves another handshake: The computer sends a FIN packet. The server acknowledges with a FIN-ACK. The server sends its own FIN packet. The computer responds with an ACK, finalizing the termination.

This entire process, spanning from entering a URL to viewing a fully loaded webpage, might seem lengthy, but with modern technology, it usually takes mere seconds.

You might enjoy reading more about how DNS works, visit Microsoft’s article. You should also read our article about Netstat.

Verified by MonsterInsights