What Are Cyberthreats?

Increasing use of technology opens a wide panel of advantage for everyone. It does so to hackers as well. Hackers are mainly of two types. Hackers working for the company for the good are white hat hackers and the other trying to harm people or even the big organizations are the black hat hackers. When these hackers build a system to hack into your personal information to use it against you, it is known as Cyber threat.
cybersecurity
Source : Aviano af mil

Cyber threat is increasing in the world where technology has become the day to day drive for every single person in the world. So, it has become a necessity to learn about these cyberthreats for everyone's personal safety.

RANSOMWARE
The perfect example of Cyberthreat can be the 2017 WannaCry ransomware attack. It's target was the computers running under microsoft windows operating systems, worlwide. It locked the users computer and asked for the huge payment in bitcoin currency in return of your backup. However, the backdoor remained active in your system, even if you had paid. These kinds of attacks are known as ransomware. It can happen to any operating system.

PHISHING

Phishing sounds like fishing. It is similar to what it sounds. Hackers create a website which is very similar to the original one and wait for you to log into it with your username and password. This way, you will have no idea what happened but, the hackers will have already gained your sensitive information for them to enjoy.

MALWARE
Malware is a piece of command that can crawl through data, over internet. It can stick with your browser or get downloaded with the files you download. Usually, they are pre-activated. So, when it finds the target, it starts to send your personal data including what you type, what you look at, what you listen to and your bank details. It slows down your PC and your browser.

PASSWORD ATTACKS
Password attacks, as the name sounds, it means attacking your password to gain access to your account. It can be your social media account or bank account. Password Attacks can be done in different ways, even through phishing and malware attacks but there is another way hackers can do it too. It is known as brute force attack. This attack basically keeps trying new password every time the system rejects it. They create a list of passwords and keep attacking it until one of it is right.

DDoS
DDoS stands for Distributed Denial of Service. This attack is normally done towards a website by the hackers. When the compromised servers sends the big number of requests to one particular website then the bandwidth is lost on sending back the data to those servers. This makes the site to go down for real users.

SNOOPING
Snooping, can be done by a person or an organization waiting for you to subscribe or connect to their network so that they can snoop into your device and capture your data for their benefits. There are multiple hotspots found in every major areas and sometimes a free ones in our neighboring area too. However, do they guarantee that they are not snooping on you?

VIRUS
Everyone using internet, downloads some kind of files they need. While downloading files, many people don't care about where they are downloading those files from. In many cases, after downloading files from an unknown location, it can have a piece of script that activates on successful download. It starts crawling in your system and slow down your system or internet connection while doing it's activities that hackers has commanded it to do. These are known as virus.

ROOTKITS
Rootkits are a set of scripts. It can help hackers to provide access to your computer system without your knowledge. These types of scripts comes with files from an unknown sources of internet or drives.

KEY LOGGERS
I could have mentioned about key loggers on password attacks up there but I wanted to talk about this a little more. The reason is because key loggers is not only used on password attacks. It is also used to learn your day to day life conversation with other people and plans. It does so by logging every keystrokes you make while typing. It takes a lot of guess works for hackers but if he is a clever one, he will figure out the patterns quickly. These key loggers needs to be installed into your system. It can come with the installation media from untrusted sites or someone has to install it. Most of the times they cannot be detected by regular antivirus software.

NOTE : With the advancement in technology, the idea of hacking also gets broad. These are the most talked about topics in cybersecurity. However, there are many more attack strategy hackers can be using. So, always be careful with your data and keep the backup of it offline in a separate drive for your security.

Here are some basic home security.

Comments