Know more about Cyber ​​attacks from Jack prabha's blog

The cyber attacks are actions performed by criminals, who use as network vulnerabilities to attack and steal data. Data that is allowed, and which are the main ones stolen, that cause great damage to your company.


Research shows that Brazil is the second country that suffers the most cyber attacks, registering 120.7 million attacks , until the year 2018, according to research by the Dfndr laboratory .


Unfortunately, the year 2019 was not very different, it was already marked by the growth of attacks. In the most popular, research showed about a 14% without increasing the diversity of malware .  


We created a unique infographic to show you more about these attacks in 2019, associated with security tips. Check out:


blog


As we know that the best way to prevent and keep a company safe is to know it as threats, presenting some of these attacks.


Let's see:  


Virus

A virus is a program or code used to damage your computer, corrupt system files and destroy data. The virus remains inactive on the machine until it is executed, that is, for the infected virus or it is necessary to run the infected program.


From there, it can infect other computers on the network , steal passwords and data, corrupt files, forward spam to e-mail contacts, or even control the computer.


Worms

They are older than viruses, remain in fashion until the late 90s and almost a decade, arriving as message attachments. One person opened an email and the entire company was infected in a short time.


What makes it so devastating is its ability to spread without end user action . Viruses, on the contrary, prompt the end user less or initiate.


Adware

In this attack, one strategy is to try to export the end user for unwanted and potentially intentional advertising. A common adware program can redirect searches from a user's browser to web pages that look like other product promotions.


This type of attack aims to obtain useful information for users such as: the location, details of passwords (passwords) and IP addresses of the computer or electronic mail.  


KNow more about the MCITP certification.


Ransomware

Also known as " digital hijacker ", or ransomware, it is software that installs your machine, encrypts the system data after installation and blocking or accessing users. With that, he asks for a ransom for a company, usually done in bitcoin , which is encryption.


MCITP Database Administrator job role involves designing and developing logical data models, create physical databases and create data services by using Transact-SQL. 


A huge loss for the company that suffers this type of attack. The ransomware is one of the types of attacks that occur more in Brazil, second in number of global ransomware attacks. The data is from Trend Micro's Smart Protection Network survey , a company focused on digital security.


Previous post     
     Next post
     Blog home

The Wall

No comments
You need to sign in to comment