Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » 5 common attacks in cyber security
    blog-cyber-attack-security
    blog-cyber-attack-security
    IT Infrastructure

    5 common attacks in cyber security

    By Ashley WangJuly 19, 2024No Comments4 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • Awareness of common cyber security attacks is crucial for individuals and organisations to safeguard sensitive information and digital assets.
    • By understanding how attacks operate in threatening cyber security, users can implement robust security measures, thus mitigating the risks posed by these attacks in today’s interconnected digital landscape.

    In the realm of digital threats, understanding common cyber security attacks is essential for safeguarding sensitive information and digital assets. This article will explore 5 types of cyber attacks, how they occur, and their potential impacts on individuals and organisations.

    1. Malware attacks

    Malware, short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, client, or computer network. It typically occurs through infected email attachments, malicious websites, or compromised software downloads. Common types of malware include viruses, worms, Trojans, ransomware, and spyware.

    Take viruses and spyware as an example. Viruses replicate themselves by attaching to clean files and spreading across systems, often causing data loss or system damage. Spyware silently gathers sensitive information, such as passwords and financial data, and transmits it to attackers.

    Also read: Multi-cloud vs hybrid cloud: Key differences

    The major ways against malware involve using antivirus software, keeping software up to date, and exercising caution when browsing or downloading content online.

    2. Phishing attacks

    By masquerading as a trustworthy entity, phishing attacks involve tricking individuals into disclosing sensitive information, such as passwords or credit card numbers. Attackers often use spoofed emails, fake websites, or social engineering tactics to deceive victims, which then leads to identity theft, financial loss, or unauthorized access to sensitive information.

    In a typical phishing scenario, an attacker sends an email posing as a legitimate organisation, such as a bank, requesting the recipient to click on a link and provide personal information. To mitigate phishing attacks, users should verify the authenticity of emails and websites, avoid clicking on suspicious links, and enable two-factor authentication.

    3. Denial-of-Service (DoS) attacks

    Denial-of-Service (DoS) attacks aim to disrupt normal traffic of a targeted server, service, or network, rendering it inaccessible to legitimate users. Attackers overwhelm the target with a flood of traffic or malicious requests, causing a slowdown or complete shutdown of services. DoS attacks can impact businesses by causing downtime, loss of revenue, and damage to reputation.

    Mitigating DoS attacks involves implementing network security measures, such as firewalls and intrusion prevention systems (IPS), and using traffic filtering techniques to distinguish legitimate traffic from malicious requests.

    Also read: IPv4 vs. IPv6: What’s the difference between the two protocols?

    4. Man-in-the-Middle (MitM) attacks

    Man-in-the-Middle (MitM) attacks occur when an attacker intercepts communication between two parties, such as between devices on a network. The attacker can eavesdrop on the communication, manipulate data, or inject malicious content without either party’s knowledge. MitM attacks are often carried out on insecure public Wi-Fi networks or through compromised routers.

    Through the use secure communication channels, such as encrypted protocols like HTTPS, and employ digital certificates to verify the authenticity of websites, this type of attack can be mitigated. Besides, implementing strong authentication mechanisms can also help detect and prevent MitM attacks.

    5. Social engineering attacks

    In social engineering attacks, attackers use deception, persuasion, or impersonation tactics to gain the trust of their victims, exploiting human psychology to manipulate individuals into divulging sensitive information. Common social engineering techniques include pretexting and baiting.

    Pretexting involves creating a fabricated scenario to trick victims into disclosing information or performing actions. Baiting offers something enticing, such as a free download, to lure victims into clicking on malicious links or downloading malware.

    Educating users about social engineering tactics and conducting regular security awareness training help defend against social engineering attacks. Additionally, implementing multi-factor authentication and maintaining a culture of security awareness can reduce the likelihood of falling victim to these tactics as well.

    cyber attack cyber security network
    Ashley Wang

    Ashley Wang is an intern reporter at Blue Tech Wave specialising in artificial intelligence. She graduated from Zhejiang Gongshang University. Send tips to a.wang@btw.media.

    Related Posts

    EPIC asia selects vibrant Jakarta venues for peer-networking 2025

    August 11, 2025

    Bouygues breach exposes telecom data risks

    August 11, 2025

    Trump urges Intel boss to quit over China links

    August 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.