Unfortunately there are now many different ways that cyber criminals can interfere with everyday running of businesses. They can use a variety of different malware* to do this, they include:
- Viruses – a small piece of code that can replicate itself and spreads between computers by attaching itself to a file.
- Ransomware – this type of malware requests a payment after the launch of an attack on a computer system.
- Spyware/Adware – this can be installed on your computer when you open a link or an attachment and when you download infected software.
- Worms – these are self-replicating and don’t need a program to attach themselves to. They are constantly looking for vulnerabilities within the computer system and then report back when weaknesses are found.
- Trojans – this is a type of virus that appears to be performing one function but actually performs malicious activity when executed.
Cyber criminals can also use attack vectors, which allow them to infect computer systems with malware or harvest stolen data, such as:
- Phishing – an attempt to gather a users private information by posing as a legitimate company/entity. (an example of social engineering.)
- Drive-by – these are attacks put in against specific weaknesses with a system.
- Social Engineering – this is the exploitation of an individuals’ weakness. This could be by clicking on infected links, or physically getting access to a persons’ computer through deception.
- Pharming – this is an attack to redirect a website’s traffic to a fake website, which is where the individuals information is then compromised. (an example of social engineering.)
- Man in the Middle (MITM) – this is an attack where a middleman impersonates each endpoint and is then able to manipulate both victims.
*a type of software that is designed to allow criminals to achieve their objectives.
Feel free to talk to one of CyberGuys on 01562 747 241 - our team of experts are experienced in their field, however we keep the jargon to a minimum, friendly, helpful and happy to answer any questions you may have.