5 Cyber-Attack Types

By infohub — Jan 15th, 2018

5 Cyber-Attack Types

5 Cyber-Attack Types

Cyber attacks are prolific in this digital era that we live in. Where there is information, there will always be attempts to try and steal it. The Internet has not only provided us with a gateway to the rest of the world but it has also provided the rest of the world access to our home and office computers. Here are some of the most common cyber attacks that you need to be careful of and protect your system and self from.

Malware: Malware is a broad term used for any sort of malicious software that tries to gain access to your computer. By opening certain email attachments or visiting certain websites, you might inadvertently allow for a security breach and give a malware access to our system. Once the malware is in your system, it can send all your data including sensitive information to the malware creator. Internet banking passwords and credit card information can be stolen this way.

Phishing: This attack comes in the form of an email which tries to bait you to click a link. The email is usually designed to look like it is from a trusted sender like your office or bank and makes you feel the need to click the link. It would be very difficult to ignore a mail that appears from your bank telling you that someone tried to gain entry into your account and that you should change your password. By clicking on the link, you would be providing access to your system to the hackers.

Password attacks:
Hackers try to steal information by attempting to log into your online bank accounts by posing as you. They use a software that attempts to crack your password, allowing them access to your accounts.

Malvertising: Very simply put, this is where a malware poses as an advertisement. If the ad looks interesting enough, we might be lured into clicking on it and accidentally downloading a malware onto out computers.

Man in the Middle (MITM): In this type of attack, the hacker infiltrates a transaction between you and your bank or an e-commerce site and then acts like a man in the middle without the knowledge of either party. The hacker poses as you to the site and poses as the site to you while gaining access to all the information being passed via the interaction, which could include your credit card details.

The best way to stop cyber attacks is to protect your computer with an anti-virus software and firewalls. Also be cautious about the sites you click on or the emails attachments you open.

Sex Offender & Criminal Records Search