Millie Gillian's profile

Protection From Cyber Attacks

Different Types Of Cyber Attacks
A lot of organizations have experienced cyber attacks this year, but how were these companies actually hit? There are a number of different ways a criminal hacker can implement a cyber attack, and they all depend on what the criminal hacker is trying to gain. Some criminal hackers want data, whereas others want a ransom fee to be paid.

These are the different types of cyber attacks which are responsible for the majority of cybercrimes all around the world:

Phishing

Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.

Man-in-the-middle attack
Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data...visit - cisco to know more.
Malware

Types of intrusive software that infiltrate onto your computer or systems. Viruses, Worms, Trojans Spyware, ransomware, Adware. Malware latches on to your computer or system and can steal your personal information or cause damage to files and information after installing. Investing in firewalls, antivirus and good protective systems can help keep your system safe, and identify as well as remove them. In some dangerous instances malware has also been used to hijack and disrupt machinery or other systems to cause even more damage.

Ransomware

Hijacking your files and locking you out from your system until you pay a sum to regain access. The most popular method is to corrupt your data and files and ask you for hundreds of thousands of dollars to release and decrypt your data. Ransomware can also be disguised as authorities ‘fining’ you for alleged misconduct and for visiting certain websites.  The worst part is, that even making a payment is never a guarantee that you will get your information back and could leave you vulnerable to future attacks...read more on - Aon.

DNS Spoofing

DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.
Session Hijacking

It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data...get more info over at - javatpoint.

Exploits and exploit kits

An exploit is a piece of malicious code that can compromise a security vulnerability. Many have been developed by the security services. For instance, in 2017 the WannaCry ransomware spread using an exploit known as EternalBlue. This exploit had been developed by, and stolen from, the US National Security Agency.

Exploit kits are collections of multiple exploits. Available for rent on the dark web, they enable unskilled criminals to automate attacks on known vulnerabilities.

MITM attacks

An MITM (man-in-the-middle) attack occurs when a hacker inserts themselves between a device and a server to intercept communications that can then be read and/or altered.
MITM attacks often happen when a user logs on to an insecure public Wi-Fi network. Attackers can insert themselves between a visitor’s device and the network. The user will then unknowingly pass information through the attacker...to know more, visit - Itgovernance.co.uk

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Get to Know about cyber attacks and safeguard yourself against these attacks.
Protection From Cyber Attacks
Published:

Protection From Cyber Attacks

Published: