Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » Understanding 3 threats to computer security
    CYBER-SECURITY
    IoT

    Understanding 3 threats to computer security

    By Doris DuJune 19, 2024No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • Malware attacks on businesses rose by 358% in 2020.
    • Phishing scams remain the most common form of cyber attack.

    Cybersecurity is an ever-evolving field, and understanding the various types of threats is crucial for both individuals and businesses. As we become more reliant on technology, the number and sophistication of these threats continue to grow.

    3 main threats to computer security

    1. Malware

    Malware refers to malicious software designed to harm, exploit, or otherwise compromise a computer system. This includes viruses, worms, trojans, ransomware, and spyware. Malware is Software designed to disrupt, damage, or gain unauthorized access to computer systems. Pros include the ability to be mitigated with antivirus software, but cons include the potential for significant data loss and operational disruption.

    Example: The infamous WannaCry ransomware attack in 2017 infected over 230,000 computers across 150 countries, demanding ransom payments in Bitcoin (approximately £260,000 or $325,000 at the time).

    Also read: Is cyber security more valuable than computer science?

    2. Phishing

    Phishing attacks involve tricking individuals into providing sensitive information by masquerading as a trustworthy entity. This often happens through deceptive emails or websites. A method of trying to gather personal information using deceptive e-mails and websites. Pros include the simplicity of user education to mitigate attacks, but cons include the sophistication and realism of modern phishing attempts making them hard to detect.

    Example: In 2016, a phishing scam targeted employees of a major US company, resulting in the theft of $100 million.

    Also read: Protecting your data in the digital age: The most pressing cybersecurity threats

    3. Distributed denial-of-service (DDoS) attacks

    DDoS attacks aim to disrupt normal traffic to a web service by overwhelming it with a flood of internet traffic. This can shut down websites and online services, causing significant downtime and financial loss. It attempts to make an online service unavailable by overwhelming it with traffic from multiple sources. Pros include the ability to use network security measures to mitigate, but cons include the potential for massive financial and reputational damage.

    Example: The 2016 DDoS attack on Dyn, an internet performance management company, affected major websites like Twitter, Netflix, and PayPal.

    A personal perspective

    Cybersecurity isn’t just a technical issue; it’s a business imperative and a personal responsibility. Every click, download, and email interaction is an opportunity for attackers, making awareness and education crucial. Staying informed about the latest threats and understanding how to protect against them can make all the difference. It’s not just about protecting data; it’s about safeguarding our way of life in an increasingly digital world. Let’s commit to creating a safer online environment for everyone.

    computer security Cybersecurity digital security
    Doris Du

    Doris Du is a reporter at BTW Media. She graduated with a master's degree in Translating and Interpreting from The Hong Kong Polytechnic University. Send tips to d.du@btw.media.

    Related Posts

    Indosat deploys Nokia AI to cut network emissions

    July 8, 2025

    Huawei’s AI lab denies copying Alibaba’s Qwen model

    July 8, 2025

    Temasek Polytechnic: Shaping future innovators

    July 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.