Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,204,967 members, 7,990,565 topics. Date: Thursday, 31 October 2024 at 06:18 PM

6 Most Liked Cyber-attacks Ways Hackers Use To Attack Your Business - Crime - Nairaland

Nairaland Forum / Nairaland / General / Crime / 6 Most Liked Cyber-attacks Ways Hackers Use To Attack Your Business (286 Views)

Suicide Bomber Killed While Trying To Attack Catholic Church. (graphic Photos) / House Owner Allow Dog To Attack A Thief As They Watch / Fulani Herdsmen Nabbed On Their Way To "Attack" A Community In Edo. Photos (2) (3) (4)

(1) (Reply)

6 Most Liked Cyber-attacks Ways Hackers Use To Attack Your Business by Omokowa(m): 2:27pm On Oct 09, 2018
Attackers targeted cryptocurrency platforms twice as often in Q2 2018 as the year before, the report found: In May and June, a number of attacks affected Verge, Monacoin, Bitcoin Gold, ZenCash, Litecoin Cash, and others, with attackers stealing more than $100 million total from these platforms. “Today, you can never be sure that criminals haven’t got your MasterCard variety from one supply or another. Even after you get a new smartphone in an exceedingly store, you’ll be able to still find yourself obtaining pre-installed malware.”

Here are the six most well-liked cyber-attacks ways criminals utilized in Q2 2018, in step with the report.

1. Malware (49%)

Cybercriminals still steal information from victims’ computers, most typically victimization spyware (26%) or remote administration malware (22%). The foremost common malware infection ways in Q2 2018 were compromising servers and workstations by accessing a targeted system victimization vulnerabilities, social engineering, or brute forced passwords (29%), planting malicious code on victims’ devices via infected websites (29%), and causing malicious attachments or links by email (23%).

2. Social engineering (25%) cyber-attacks

Cybercriminals continue to innovate in the social engineering space, developing new methods to manipulate users into believing a message, link, or attachment is from a trusted source, and then infecting targeted systems with malware, stealing money, or accessing confidential information, a report found.

3. Hacking (21%)

Hacking—exploiting vulnerabilities in code associated with software and hardware—is usually the primary step in any cyber-attacks, the report expressed. Hackers presently cause the foremost injury to governments, banks, and cryptocurrency platforms.

4. Certificate compromise (19%)

While enterprise users progressively look to Arcanum (secret-password) managers for storing and keeping track of passwords, these managers can even be liable to attack, the report noted.

5. Internet attacks (18%)

Cybercriminals will extort website operators for profit, typically by threatening to steal shopper databases or clean up the website.

6. DDoS (5%)

DDoS tends to be the weapon of alternative for business rivals, dissatisfied purchasers, and hacktivists, in step with the report. These attacks usually hit government establishments, and political events are a serious driver. However, criminals additionally perform DDoS attacks for profit, taking websites offline and demanding payment from the victims to prevent the attack.

While all these cyber-attacks are real threats to a business, corporations will need to take many steps to keep their information safe, together with centralizing update management, putting antivirus protection on all systems and endpoints, and implementing SIEM capabilities, the report counseled. Businesses ought to additionally code all sensitive data, perform regular backups, minimize the privileges of users and services as much as possible, and use two-factor authentication. Imposing a pass-worded policy with strict length and complexness needs, and requiring Arcanum changes every ninety days, can even facilitate to shield your systems.
New Action movies

view for more: https://www.scitechinfo.com.ng/blog/2018/10/04/well-liked-cyber-attacks-ways-hackers-attack-business/

(1) (Reply)

ADEX UPDATES Na Wa O!! Young Girls In Delta State Using Charms To Woo Men For / Gate Man Arraigned For Allegedly Stealing Wig Worth N125,000 / EFCC Lists Case Against NBA President Paul Usoro And Akwa Ibom Governor, Udom

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 29
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.