5 Types of Cyber Attacks you will likely to suffer from4 min read

The History Of Cyber Security

The History Of Cyber Security

The cyber security threats and their attacks are continuously being more smarter and relentless, which forces the businesses into conjuring a three-part defense mechanism to prevent, detect and respond as well against such attacks.

Over the last 25 years, the worms, viruses and data breaches have been developing fast, hence becoming increasingly sophisticated and tenacious.

yet, it was not enough for cyber-security professionals to keep up with these advancements.

Therefore, the present evidences show that the skilled, well-funded hackers are becoming much stronger, smarter and capable of accessing any network.

Additionally, cyber criminals are taking their skills to new levels over years from the first worm (at 1989), to the first viruses (1990- 1999), Credit card cyber attacks (2005-2007), Target and Sony (at 2014), and they are growing up increasing their powers.

The year 2017 also saw the outbreak of the “biggest ransomware outbreak” and there will definitely be more and more.

Why is cyber security important?

Types of Cyber attacks

Cyber security is very important for two main reasons:

The expanding threats

Year by year, the number of cyber security attacks is increasing dreadfully.

Actually, statistics showed that the cost of cyber crimes was between $400 billion and $500 billion during the period between 2013-2015, and this number is increasing by years.

They expect that it will to reach $6 trillion by 2021, and this includes the damage and destruction of data, stolen money, embezzlement, forensic investigation, fraud, lost productivity, theft of intellectual property, theft of personal and financial data, post -attack disruption to businesses, restoration and deleted hacked data and systems, and many others.  

However, the security is not just the responsibility of the security team, everyone is responsible too especially with all the spear phishing attacks.

The severity of attacks

Furthermore, the number of cyber security attacks is rising and their degree is growing as well.

Recently, the attacks have become much more destructive and targeting a broadening array of information and attack vectors which is putting everyone at risk, even the politicians.

Past reports declared that Obama’s administration proposed a $19 billion budget for cyber security, while many of Hillary Clinton’s private emails reached the pages of the newspapers.

Therefore, the current President Donald Trump signed an executive order in May 2017 focusing on improving cyber security in the US.

Types of Cyber attacks

The History Of Cyber Security
There are many types of cyber attacks, but here are the most popular 5 which you’re most likely to face:

  • Socially engineered malware

Socially engineered malware is the most popular cyber attack as it provides the No. 1 method of attack.

This attack may take place when:

  • An end-user is tricked from a familiar, trusted website into running a Trojan horse program.
  • An innocent website is delivering malware instead of normal website coding.
  • A website asks its users to install some new piece of software to access the website, this may run fake antivirus software or other malicious piece of software.

In the above cases, there would be a big chance that the user is asked to do some actions to stop any security warning from his browser to disable the defenses.

  • Password phishing attacks

Password phishing attacks are so popular today as approximately 60 to 70 percent of the emails we receive are just spam, and most of them are phishing attacks looking to trick users out of their logon credentials.

Thanks to anti-spam vendors services, our inboxes are still reasonably clean.

  • Unpatched software

In general, programs like Adobe Reader and other browser add-in programs which people often use to make surfing the web easier are the most common unpatched and exploited programs.

Even with this unpatched problem, you may never see a company which has ever had perfectly patched software.

  • Social media threats

Facebook, Twitter, LinkedIn, and other social medias are leading our online world today.

However, social media has many threats including a rogue friend or application install request.

If you fall in their trap and accept the request, you will be giving them access to everything in your social media account.

Don’t underestimate the potential of those hackers as some of the top hacks started out as simple social media hacking.

Corporate hackers love exploiting corporate social media accounts to find out if there is any password shared between the social media site and the corporate network.

  • Advanced persistent threats

Why is cyber security important

APTs usually use socially engineered Trojans or phishing attacks.

They send a specific phishing campaign (spear phishing) to multiple employee email addresses, those emails contain a Trojan attachment.

If the employee clicks it, APT attackers can compromise an entire enterprise in a matter of hours.



Leave a Response