Cyber Attacks on the Look

Cybersecurity is the practice of defending computers and servers, mobile devices, electronic systems, data and network from malware attacks. The concept is so wide because it applies to a variety of cases – from information security to disaster recovery and final users good practices.

Why is finding Software Bugs not always a bad thing? Check out this blog post

Most Common Cyber Attacks

Cyber threats can be categorized into three big groups:

  • Cyber Crime: individual or groups that strike systems to obtain financial earns.
  • Cyber War: to gather information with political motivations.
  • Cyber Terrorism: to compromise electronic systems to create panic or fear.

Most used methods to control and attack computers and electronic systems are:

Malware (malicious software)

  • Virus: it affects the system’s files through malicious code. To achieve its purpose, the virus requires the user’s execution of the file. Once executed, it spreads to other executable files of the system through hardware devices such as pen drives, portable hard drives, and others.
  • Worm: once it affects the computer, this software creates countless copies of itself and spreads them through the network. Contrary to the viruses, it doesn’t need human intervention to be distributed to other systems. Since it doesn’t affect the normal running of the system, it’s hard to detect. Its primary objective is to create botnets, computer networks that can run any command once the worm is inside.
  • Trojan: it is similar to the virus, but not the same. While the virus is destructive itself, the trojan aims to open the system to allow the entrance of other programs. Usually, it isn’t noticed because it doesn’t reproduce itself, and is generally part of supposed harmless executable files.
  • Spyware: works as a spy. Its primary goal is to obtain information and install programs in computers without consent, in a silent way, so it’s tough to detect.
  • Adware: aims to show advertising. Though it doesn’t intend to harm the computer, sometimes it is considered as spyware because it may compile and transmit data.
  • Ransomware: it “kidnaps” information and ask for a reward. Usually, a bitcoin transfer is requested to avoid the geolocation. It’s one of the worst cases of cybersecurity breach.

Spoofing/Phishing

It works by changing the identity; this is why it only affects individuals to trick them to share sensitive information. It usually steals data through emails, electronic messages or phone calls. Generally, it operates under the name of well-known entities asking for confidential information such as bank account numbers.

Distributed Denial of Service (DDoS) Attack

It is probably the most common and known of all the cyber attacks. The process works by running a significant number of petitions to a server from multiple computers to make it flood and collapse.   

There are many techniques to achieve the break down of a server. The simplest is by using botnets, equipment infected with trojans, which owners are not aware.

How to Stay Ahead of Cyber Attacks?

The central principle to prevent cyber attacks is the continuous monitoring of electronic resources in real time, according to the National Institute of Standards and Technology of the U.S. Department of Commerce.

But, how do we, as users, can protect ourselves?

Cyber Security depends on cryptographic protocols used to code emails, files, and any critical data. Security should not only protect the information inside devices but also avoid losing or having it stolen. Security software analyzes computer searching for malicious code, once detected; it eliminates it from the device.

We all need to be aware of the possible risks our information, systems, and equipment are facing to adopt the best preventive routines we can. Being a step ahead of cyber attacks by understanding the correct use of Cyber Security enables us to work fluently and enjoy the benefits of the network.

Why is finding Software Bugs not always a bad thing? Check out this blog post

Menu