April 26, 2021

What are the Cyber ​​attacks?

The cyber attacks are actions performed by criminals, who use as network vulnerabilities to attack and steal data. Data that is allowed, and what are the main ones stolen, that cause great damage to your company.

Research shows that Brazil is the second country that suffers the most cyber attacks, registering 120.7 million attacks , until the year 2018, according to research by the Dfndr laboratory .

Following growth, in 2019 was not much different research showed about a 14% to increase the diversity of malware .

Unfortunately, the year 2020 did not bring improvements. On the contrary, among many things, the year was marked by an exploitation of cyber attacks. A 400% increase in the number of attacks recorded, according to Next Generation data .

As we know that the best way to prevent and keep a company safe is to know it as threats, presenting some of these attacks.

Virus
A virus is a program or code used to damage your computer, corrupt system files and destroy data. The virus remains inactive on the machine until it is executed, that is, for the infected or necessary virus to run the infected program.

From there, it can infect other computers on the network , steal passwords and data, corrupt files, forward spam to e-mail contacts, or even control the computer.

Worms
They are older than viruses, they remain in fashion until the end of the 90s and almost a decade, arriving as attachments to messages. One person opened an email and the entire company was infected in a short time.

What makes it so devastating is its ability to spread without end user action . Viruses, on the contrary, prompt the end user less or initiate.

Anetwork engineeris a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

Adware
In this attack, one strategy is to try to export the end user for unwanted and potentially intentional advertising. A common adware program can redirect searches from a user's browser to web pages that look like other product promotions.

This type of attack aims to obtain useful information for users such as: the location, details of access passwords (passwords) and IP addresses of the computer or electronic mail.

Posted by: Jack prabha at 01:43 PM | No Comments | Add Comment
Post contains 389 words, total size 3 kb.




What colour is a green orange?




13kb generated in CPU 0.0102, elapsed 0.036 seconds.
35 queries taking 0.0283 seconds, 64 records returned.
Powered by Minx 1.1.6c-pink.