Posts

Showing posts with the label What are the different types of cyber attacks?

cybersecurity concerns for 2018

Image
In May 2017 we saw the latest cyber threats. WannaCry ransomware attack , targeting computers running Windows operating system. Infected computers are frozen and display a big message, “Oops, your files have been encrypted!”. A total of 53,081 cyber crimes were reported in 2017, according to the Indian Computer Emergency Response Team. 1 . Crypto jacking "gold rush" Cryptojacking activity began exploding toward the top of 2017 and that we suspect that we'll see much more activity in 2018, notably because the price of cryptocurrencies escalates. What makes this type of activity fascinating is, however, it's created an indistinct line between the everyday net user and therefore the cybercriminal. a personal mining cryptocurrency may okay be mining for his or her own pocketbook, supported guests to their own net properties. there's conjointly an awfully doubtless probability among those circumstances that disclosed crypto jacking activity may replace adver...

Most Common WEB Security Vulnerabilities

Image
Even the most experienced IT chief and web security expert must stay vigilant and guard against the bad guys. No one is safe without knowing what to look out for. Here are six of the most common security vulnerabilities you must protect yourself against. 1. SQL Injections SQL injection is a type of web application security vulnerability in which an attacker attempts to use application code to access or corrupt database content. If successful, this allows the attacker to create, read, update, alter, or delete data stored in the back-end database. SQL injection is one of the most prevalent types of web application security vulnerabilities 2 . Cross Site Scripting (XSS) Cross-site scripting (XSS) targets an application's users by injecting code, usually a client-side script such as JavaScript, into a web application's output. The concept of XSS is to manipulate client-side scripts of a web application to execute in the manner desired by the attacker. ...

What are the different types of phishing?

Image
Spear phishing Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success. Clone phishing Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. Whaling Several phishing attacks have been directed specifically at senior executives and other high-profile targets within businesses, and the term whaling has been coined for these kinds of attacks. Link manipulation Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization Filter evasion Phishers have even started using images instead of text to make it harder for anti-phishing filt...