The following is a list of common cyberattacks aiming at causing system harm.
-
Man in the Middle: The attacker inserts himself between the sender and the receiver’s communication. This is done in order to eavesdrop and mimic in order to steal information.
-
Phishing: In this case, the attacker will pose as a trustworthy source in order to get sensitive information such as usernames, passwords, and credit card details.
-
Rogue Software: This is a deceptive attack in which the attacker creates a virus on the target device and then provides an anti-virus application to eradicate it. This is done in order to infiltrate the machine with malicious software.
-
Malware: Malware is a type of software that is specifically designed to attack a computer system. Viruses, worms, ransomware, spyware, and other malicious software are examples of malicious software.
-
Drive-by Downloads: The hacker takes advantage of the absence of updates on the operating system, software, or browser, which causes malicious malware to be downloaded to the system automatically.
-
DDoS: This is used to flood the target network with large amounts of traffic, rendering the website or service unusable.
-
Malvertising: Malvertising is the introduction of malicious code into legal advertising networks, causing visitors to be sent to undesired websites.
-
Password Attacks: Here, the cyber hacker cracks credentials such as passwords, as the name implies.