SECURE&TIP: TYPES OF CYBER-ATTACKS

This entry is also available in:

 

In today’s SECURE&TIP we want to explain to you the types of cyber-attacks that exist, to help you better understand the recommendations we will give throughout this year.

  • HUMAN: Being the most successful method, it is used in more than 90% of all cyberattacks that we can suffer. They are also called social engineering, because the cybercriminal tries to manipulate or deceive a person to provide personal information or make the payment of a demanded amount. We can suffer them by e-mail (Phishing), phone call (Vishing), SMS/Chat/Whatsapp short message or similar (Smishing) or fake pages and online stores (Pharming).

RECOMMENDATION: When in doubt, do not rely on that communication and check the information or payment they demand from us, by other means (app, phone, physical office, etc.).

  • CYBERNETIC: In this case the cybercriminal directly attacks computer systems or technologies that we use, through the Internet. The most common are fake WIFI networks and attempts to install a malicious program or application (malware). Once installed, this program allows spying on everything we do with our computer, mobile or tablet, stealing the information contained therein or even damaging the system to blackmail us in exchange for the payment of a certain amount to recover our data.

RECOMMENDATION: Do not connect to the internet through an unknown WIFI, especially if it is free or public, and have security programs that detect malicious programs (Antivirus, Firewall, we will talk about them).

  • PHYSICAL: We cannot forget about physical cyber-attacks, which are used by traditional criminals who have modernized in the use of support technologies. Thus, it is possible for them to break into our homes or offices, or to steal our vehicle, a computer or a cell phone, without the need to force the doors, have access codes or passwords, and having deactivated possible alarm systems.

RECOMMENDATION: They are more difficult to avoid, so the important thing is to react as soon as possible, informing the IT Department, in the work environment, and reporting the crime to the Police, in the personal environment.