By its very name, when talking about an "#attack", we are faced with an aggression to our information, devices and any digital form that is altered in its usual operation by a third party that is not authorized; either to alter the functioning of our digital devices, the information contained therein, and/or their interaction with other digital media. A #cyberattack can occur to our computers, network systems, smartphones, electronic tablets, smart TVs, or any electronic device, connected to a communication network.
Today we are walking in leaps and bounds to have a life where interaction with the technological – digital world, is present in simple situations for both individuals and businesses, and therefore being exposed to a cyberattack is dormant at all times; that's why the importance of knowing the types of cyberattacks we can face:
#Malware: We are talking about harmful software, which is installed on computers, most of the time via malicious links. By clicking on the malicious link, the user can allow from a third party without permission to enter the computer information, to access and misuse personal data. It is important to note that the user, by refraining from clicking on sites or links that he does not know, avoids such an attack to a high degree.
#Phishing: As the English name refers, it is about "fishing" information to do so, making misuse of it, either to steal accounts, to impersonation. In these cases the user is also caught in some situation where he is asked to share his personal data by clicking on some link.
#Vishing: In this mode, it is also a matter of the offender impersonating a person and/or company. Here the decoy is a phone call, in which the offender impersonates an institution, company or person, and in a call seeks to obtain personal data and subsequently negotiate with them.
#Smishing: In this case, impersonation occurs via SMS or instant messaging tools like WhatsApp. Through links or attachments to messages, criminals ask the user to provide personal or bank details.
No Service (#DOS and #DDOS): Here the goal of criminals is to overwhelm the target servers, to leave them inaccessible, and thus cause users to be unable to access their services. Such an attack can last for minutes, hours, or even days.
In the face of any cyberattack, the most important thing is to keep in mind that the cyber-criminal will seek to have access to user/company information, and therefore the basic ways to protect us are:
• Install #antivirus on all electronic devices
• Check always browse safe pages
• Modify access keys continuously, and have different keys for each site that requires an access key
• Do not provide personal data unless you have verified the #security of the sites where you browse